General
-
Target
JaffaCakes118_599dec1733d7b4ec8fe1aa21dfed2abb
-
Size
29KB
-
Sample
250101-sekkxsskcl
-
MD5
599dec1733d7b4ec8fe1aa21dfed2abb
-
SHA1
905c256944efa5d3f5776490e990f3a6ed79fc07
-
SHA256
ef295d4914256847b5f0accbc001a5dda588e05e0c85fcb479eca30cb17aee18
-
SHA512
9e86230d5e017469a2320742d7b5d7341a457dbafa0c40ad1c094dd328b8cf82799775dceba3bf2ff84d8663a8c9f76c042139b8f17f586ce04f0b9976f7e93f
-
SSDEEP
768:Zv/27NYsDkf3mEMqw7ecBKh0p29SgRGr:Zm7N1XfdFKhG29jGr
Behavioral task
behavioral1
Sample
JaffaCakes118_599dec1733d7b4ec8fe1aa21dfed2abb.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_599dec1733d7b4ec8fe1aa21dfed2abb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.6.4
HacKed
unkusernj.ddns.net:1177
a474c6d2b75d64b3ed1078b377b83c48
-
reg_key
a474c6d2b75d64b3ed1078b377b83c48
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_599dec1733d7b4ec8fe1aa21dfed2abb
-
Size
29KB
-
MD5
599dec1733d7b4ec8fe1aa21dfed2abb
-
SHA1
905c256944efa5d3f5776490e990f3a6ed79fc07
-
SHA256
ef295d4914256847b5f0accbc001a5dda588e05e0c85fcb479eca30cb17aee18
-
SHA512
9e86230d5e017469a2320742d7b5d7341a457dbafa0c40ad1c094dd328b8cf82799775dceba3bf2ff84d8663a8c9f76c042139b8f17f586ce04f0b9976f7e93f
-
SSDEEP
768:Zv/27NYsDkf3mEMqw7ecBKh0p29SgRGr:Zm7N1XfdFKhG29jGr
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1