General
-
Target
JaffaCakes118_628d18521ab38530da03c31f80c3ddc9
-
Size
96KB
-
Sample
250102-en9phssmay
-
MD5
628d18521ab38530da03c31f80c3ddc9
-
SHA1
a13468e507598364bb4727725c0f5788ea371ac3
-
SHA256
c9b7158b61aa85faaa40ba6188ed612783963f2d67ca61117dd81af3861140de
-
SHA512
08cd9e38da1fceadb42720e287713670d789e12ed517b30ca67c8749ac19553533ad25e22d685f349b7976ac15f3a9f3f57d8b79261e319eb83f625b4004283a
-
SSDEEP
1536:zHv/gtmQdQWbDt7/xAF8ewaP6/f3I1+EKxtqErD2:z3gtmQdFt/xAhwaPof3IYztD2
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_628d18521ab38530da03c31f80c3ddc9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_628d18521ab38530da03c31f80c3ddc9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
MMB_IM
crazy0love.no-ip.info:2222
4bee2ac1f11bbf1039ce1d58d3fa0ae7
-
reg_key
4bee2ac1f11bbf1039ce1d58d3fa0ae7
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_628d18521ab38530da03c31f80c3ddc9
-
Size
96KB
-
MD5
628d18521ab38530da03c31f80c3ddc9
-
SHA1
a13468e507598364bb4727725c0f5788ea371ac3
-
SHA256
c9b7158b61aa85faaa40ba6188ed612783963f2d67ca61117dd81af3861140de
-
SHA512
08cd9e38da1fceadb42720e287713670d789e12ed517b30ca67c8749ac19553533ad25e22d685f349b7976ac15f3a9f3f57d8b79261e319eb83f625b4004283a
-
SSDEEP
1536:zHv/gtmQdQWbDt7/xAF8ewaP6/f3I1+EKxtqErD2:z3gtmQdFt/xAhwaPof3IYztD2
-
Njrat family
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-