General
-
Target
JaffaCakes118_64f6c6892c3dac81822aee1dcdbf8750
-
Size
398KB
-
Sample
250102-n9ln9atqel
-
MD5
64f6c6892c3dac81822aee1dcdbf8750
-
SHA1
2b36d272e6c14458aaa9a993531415ef2ac13ca2
-
SHA256
d1bc142250f174baf6bf227f4f586bf8f2985c40c1499a7836d5f211451b31e4
-
SHA512
4c5f2a874eb9f9df78a3e3bb1627f4239668889fa8e40b1fde00d78bf384874378b498822df2eb77cf6119a1463e291d970ecd84b291df79d7e49a52231be8bb
-
SSDEEP
12288:i3B2SB+ol/hGvcQ5a51AiR643FzMBLjJ:AB2SBS
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_64f6c6892c3dac81822aee1dcdbf8750.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_64f6c6892c3dac81822aee1dcdbf8750.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.6.4
HacKed
xhxixx.no-ip.biz:1177
4c598de1834ed60caa6acfadf4ae0156
-
reg_key
4c598de1834ed60caa6acfadf4ae0156
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_64f6c6892c3dac81822aee1dcdbf8750
-
Size
398KB
-
MD5
64f6c6892c3dac81822aee1dcdbf8750
-
SHA1
2b36d272e6c14458aaa9a993531415ef2ac13ca2
-
SHA256
d1bc142250f174baf6bf227f4f586bf8f2985c40c1499a7836d5f211451b31e4
-
SHA512
4c5f2a874eb9f9df78a3e3bb1627f4239668889fa8e40b1fde00d78bf384874378b498822df2eb77cf6119a1463e291d970ecd84b291df79d7e49a52231be8bb
-
SSDEEP
12288:i3B2SB+ol/hGvcQ5a51AiR643FzMBLjJ:AB2SBS
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1