General
-
Target
JaffaCakes118_4de9f1ab1f842add1fd7954e320a6dd0
-
Size
1010KB
-
Sample
250101-kaej4sslhp
-
MD5
4de9f1ab1f842add1fd7954e320a6dd0
-
SHA1
78b5d45556ada1286e7125f2af156bf96742f94f
-
SHA256
bc4a3e67dd760707d72e013997625924a62e35f5caf5b2492c07c712c29af40d
-
SHA512
95eb0b92b40e361246084d4364835048ba381aa21af9b3ef2d0334436933d5caf330ec45f52c7fe6685f87c022bfe259ae6eab71864f2478903d713ca2e8a53a
-
SSDEEP
12288:5tb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaETQCA4q6A:5tb20pkaCqT5TBWgNQ7aETQKq6A
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4de9f1ab1f842add1fd7954e320a6dd0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4de9f1ab1f842add1fd7954e320a6dd0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
botnetvictim
girtatapke.duckdns.org:1437
36a380dc559c5de908a35bf7366d9bbb
-
reg_key
36a380dc559c5de908a35bf7366d9bbb
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_4de9f1ab1f842add1fd7954e320a6dd0
-
Size
1010KB
-
MD5
4de9f1ab1f842add1fd7954e320a6dd0
-
SHA1
78b5d45556ada1286e7125f2af156bf96742f94f
-
SHA256
bc4a3e67dd760707d72e013997625924a62e35f5caf5b2492c07c712c29af40d
-
SHA512
95eb0b92b40e361246084d4364835048ba381aa21af9b3ef2d0334436933d5caf330ec45f52c7fe6685f87c022bfe259ae6eab71864f2478903d713ca2e8a53a
-
SSDEEP
12288:5tb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaETQCA4q6A:5tb20pkaCqT5TBWgNQ7aETQKq6A
Score10/10-
Njrat family
-
Suspicious use of SetThreadContext
-