General
-
Target
JaffaCakes118_6fce57df746350b34c6e7ace27963850
-
Size
29KB
-
Sample
250103-1akzwstqdz
-
MD5
6fce57df746350b34c6e7ace27963850
-
SHA1
7326d6ba51b64d7838c342cda5b8bd211458f786
-
SHA256
3cedcaa57838104537dc40e995eda9e8ad88c854192eab36e5a50d3922c969ff
-
SHA512
bada62eef071134866fbb28726f9af243f8fcad1d134a75943bd989bd201c8f6185c34127f9785b625ac3e8e8d63781ef9ee32e4fb299af148c9328788e38bc4
-
SSDEEP
768:ppgh3JvFJl1fxhq4MUztswZ8q627Ypj3mrVoe:puhfJ7JhqtitswZ828xfe
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
basheers.no-ip.biz:802
b4488cccbca8d5923127abf4aa20e797
-
reg_key
b4488cccbca8d5923127abf4aa20e797
-
splitter
|'|'|
Targets
-
-
Target
sample
-
Size
40KB
-
MD5
a9757714575730226fede0eecf4f4ae9
-
SHA1
2b4f2e2f768341c7d0648dc7ae3ac36174bfcd02
-
SHA256
057b75b211de20c064b338e0a14bfe30456d23c19e0a0c5347704d262b950a06
-
SHA512
3ea0be91b9e862145eaa1b8d92c2c8675bdbffa075d2183ef31abd6f6eed0dfecd886b8225397bdea9b616c121a52a6b7647e000fdeee0117611b8135be2c5ab
-
SSDEEP
384:tlbTkCTZu/h/2uXMd2nOOrgkOU7TtKD9E5ouIEZGdjkTbsq42WuGLW6I31Yk5gbn:tqGZ4MQ9tswZ8My27YpjbQO
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1