General
-
Target
JaffaCakes118_62b10a3175818431001507c305a49490
-
Size
65KB
-
Sample
250102-e7xjastlgt
-
MD5
62b10a3175818431001507c305a49490
-
SHA1
c0e6189a44e96abd512aec72f0757143101b9e02
-
SHA256
e839a805feb80d2c56bed12d39f330b97f4f59439de9d71f3d38e0705e81ea2f
-
SHA512
198f404980199f9378eef40be54181c26f2bad3b19c8de8b73acbc1cafe1fae3bc45b18f65ff992e073365d9c7eb2051d1d4b92d826a57057e5902ba17b262e2
-
SSDEEP
1536:3r0GczfafmPxS9Cdt9t7+n/GtJ03BB++qhsY:3gGcOKhBt7+n/G43Y5
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62b10a3175818431001507c305a49490.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_62b10a3175818431001507c305a49490.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
ahmedwind.no-ip.org:1177
026a497eb8f5870d3236fd34198c3d35
-
reg_key
026a497eb8f5870d3236fd34198c3d35
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_62b10a3175818431001507c305a49490
-
Size
65KB
-
MD5
62b10a3175818431001507c305a49490
-
SHA1
c0e6189a44e96abd512aec72f0757143101b9e02
-
SHA256
e839a805feb80d2c56bed12d39f330b97f4f59439de9d71f3d38e0705e81ea2f
-
SHA512
198f404980199f9378eef40be54181c26f2bad3b19c8de8b73acbc1cafe1fae3bc45b18f65ff992e073365d9c7eb2051d1d4b92d826a57057e5902ba17b262e2
-
SSDEEP
1536:3r0GczfafmPxS9Cdt9t7+n/GtJ03BB++qhsY:3gGcOKhBt7+n/G43Y5
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1