General
-
Target
JaffaCakes118_6067b027089481ea72cd18b2882768f0
-
Size
80KB
-
Sample
250101-yvbwls1ras
-
MD5
6067b027089481ea72cd18b2882768f0
-
SHA1
9e36042c99d5635989327cfffd2e0ead0d786d8b
-
SHA256
97dd41743346198cd775d0b18e6a44dc3d75df4273378f9f5b4b84d7b53159e2
-
SHA512
51c2d0280819cfba01917b69fde4b60da034917c8daac7a1bf45f72000346433e369539936941bc8bca0341e88d67c9be07bd25e2395a9f39c7802e1e68ca085
-
SSDEEP
1536:zA8MK9KTyAKY1XT+5pcrk+v5KAqkceml11ZJb:j5B5SrXKAHcegrb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6067b027089481ea72cd18b2882768f0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6067b027089481ea72cd18b2882768f0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
abunasreeeecom.ddns.net:5552
26b6b4d063df431e0e2d530a57f410e6
-
reg_key
26b6b4d063df431e0e2d530a57f410e6
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_6067b027089481ea72cd18b2882768f0
-
Size
80KB
-
MD5
6067b027089481ea72cd18b2882768f0
-
SHA1
9e36042c99d5635989327cfffd2e0ead0d786d8b
-
SHA256
97dd41743346198cd775d0b18e6a44dc3d75df4273378f9f5b4b84d7b53159e2
-
SHA512
51c2d0280819cfba01917b69fde4b60da034917c8daac7a1bf45f72000346433e369539936941bc8bca0341e88d67c9be07bd25e2395a9f39c7802e1e68ca085
-
SSDEEP
1536:zA8MK9KTyAKY1XT+5pcrk+v5KAqkceml11ZJb:j5B5SrXKAHcegrb
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1