General
-
Target
JaffaCakes118_66f357009761da16ba97118cf921f030
-
Size
97KB
-
Sample
250102-wav3mszlg1
-
MD5
66f357009761da16ba97118cf921f030
-
SHA1
7fa0857714cbfc108bf92ba81ea55a04f3adbafb
-
SHA256
1b8213f36e6aca9379292c1e2d77c46351703b89936d1e892c95a9496f83cb61
-
SHA512
9b77ef66e4dafec78a7bc5014aeff22e460a3ea7ec23ca1395a8e4cb741975005ab525f0e72db65ba58a9ca5bcd54b23f09c8b110082211094189e3555525a4c
-
SSDEEP
1536:BbL7oRv1uhlfShVjSEYTdp0u3p0WIkyZDKeO2XXZuF23CLyOHKr0hnv:9EyhMPYTdpFZnIk4DKeO2VbOHo0Bv
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_66f357009761da16ba97118cf921f030.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_66f357009761da16ba97118cf921f030.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
<<L~0~0~K >>
microsoft-help.myvnc.com:211
7484964710ffec0dd0c0abcd35c14b2c
-
reg_key
7484964710ffec0dd0c0abcd35c14b2c
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_66f357009761da16ba97118cf921f030
-
Size
97KB
-
MD5
66f357009761da16ba97118cf921f030
-
SHA1
7fa0857714cbfc108bf92ba81ea55a04f3adbafb
-
SHA256
1b8213f36e6aca9379292c1e2d77c46351703b89936d1e892c95a9496f83cb61
-
SHA512
9b77ef66e4dafec78a7bc5014aeff22e460a3ea7ec23ca1395a8e4cb741975005ab525f0e72db65ba58a9ca5bcd54b23f09c8b110082211094189e3555525a4c
-
SSDEEP
1536:BbL7oRv1uhlfShVjSEYTdp0u3p0WIkyZDKeO2XXZuF23CLyOHKr0hnv:9EyhMPYTdpFZnIk4DKeO2VbOHo0Bv
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1