General
-
Target
JaffaCakes118_6081d526ddb3c4b281506bc366eba1d0
-
Size
11KB
-
Sample
250101-zafjqssphx
-
MD5
6081d526ddb3c4b281506bc366eba1d0
-
SHA1
d16aecfb6781790a5eec7ecaac4bc497130638a9
-
SHA256
a91818afca0774910c2d2b70731d26d59561aab450235ec16ba7f8120caa3718
-
SHA512
3ab6b0c52234cf1ba8fd6a4c730e31712307ef891c77d70f0a04bcfe1581902e7661582baf240e29d61f496a5a9bd9f7646fa601c292d8e88ed6fa3f47dcec74
-
SSDEEP
192:oJDjqWx/u/mvRqdD0pCcivlSEsp/7P1idgwVwFKN8yeysycLj1JImRL2K:oEO/6mMdDqbilI/7PC5QfL7IY
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
Mr.Black Hack
127.0.0.1:5552
174c5beaaab0252002ef1fe5676b6863
-
reg_key
174c5beaaab0252002ef1fe5676b6863
-
splitter
|'|'|
Targets
-
-
Target
sample
-
Size
23KB
-
MD5
cfafc457b9af188d615d4760a4c5e35d
-
SHA1
577b3a0061d386390cc9b48ed74e8fa2e4572bca
-
SHA256
1a668b3c7f20fe9607344da0b6c0bf291416f1fe397f4c542cfc6f95acfc480c
-
SHA512
b19f71c42001cdc03114c57bc189416a4e73a8bd26d75e0dee180a162fe25f729abc9d4c99bbcd9b9d780cf3166ad9972466a060d772e600c14895c23bc1dd02
-
SSDEEP
384:qwTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RRmRvR6JZlbw8hqIusZzZKuG:pvZiBK1edNRpcnu5h
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1