General
-
Target
JaffaCakes118_67e9f048a8496c0c78cb9bf80c0ad800
-
Size
13KB
-
Sample
250102-ypncfswqhr
-
MD5
67e9f048a8496c0c78cb9bf80c0ad800
-
SHA1
9150318b90aa299a06457c84a9a8801006acbbd3
-
SHA256
a5c9fcb35fcae9abf9e18c9b631d981ead63255e28efc0386e72ec004a0b6a3c
-
SHA512
416429d64d21c56321e548b04aaea179163075498ac868160cbb75b2b12be8f0868533aa41fa43c918cccd52b6fe6d62b155deaa7e0fd0e3011610a12fa3365a
-
SSDEEP
384:/Ngswni6P7iQ4Nk70QJW2zm9vSRvSU+fMnFgRK0HCNcs6A:F9sFt4Nkgx2z+vSJSUFUCcNA
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:1604
032c6e346b739748e572e06648200854
-
reg_key
032c6e346b739748e572e06648200854
-
splitter
|'|'|
Targets
-
-
Target
sample
-
Size
23KB
-
MD5
aec3f2c8eb5674cedddcdd429d1f3678
-
SHA1
f336ab3defc654d191aa4ffa3ea935ab2c2a04d5
-
SHA256
cc07689332bdcc48ac8025ae968ad3ac4923ed51460c76b5aa78c1af2a03a6b1
-
SHA512
50a46955aee69aa1b759cc603533f40e43d0d2d22b46e0a61c358675ada5ac684c4f43ce2d708c37032a57f6e790922f90b8e06da93417192044008f1e78e58c
-
SSDEEP
384:RweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZhRk:GLq411eRpcnun
-
Njrat family
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1