General
-
Target
JaffaCakes118_6b4961bd714e87ac58bc94057c4729a0
-
Size
128KB
-
Sample
250103-j1421svqay
-
MD5
6b4961bd714e87ac58bc94057c4729a0
-
SHA1
0f90067112fe4d6de159bb4170fafc4abf111907
-
SHA256
707c81984e055b8ef5bf439bec0449be52ea160180baf60df314abab53133937
-
SHA512
45887544f16f59dc6063ed96a7f3e04335120d08b0f7e6f20412e4fa6cbb6bd90b1a230af07508e6195bb381c1c2b92624a14a33b4d9bc4b075fe9cecebb9679
-
SSDEEP
3072:JIJO91gvrt/YObLz6tTs6b/KItLvYFdJIwFAd/LWxidvIuV:H1OtgWLGtfb/1lviIkAdEid5
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6b4961bd714e87ac58bc94057c4729a0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6b4961bd714e87ac58bc94057c4729a0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.6.4
HacKed
backdoor25.no-ip.org:81
23556fb1360f366337f97c924e76ead3
-
reg_key
23556fb1360f366337f97c924e76ead3
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_6b4961bd714e87ac58bc94057c4729a0
-
Size
128KB
-
MD5
6b4961bd714e87ac58bc94057c4729a0
-
SHA1
0f90067112fe4d6de159bb4170fafc4abf111907
-
SHA256
707c81984e055b8ef5bf439bec0449be52ea160180baf60df314abab53133937
-
SHA512
45887544f16f59dc6063ed96a7f3e04335120d08b0f7e6f20412e4fa6cbb6bd90b1a230af07508e6195bb381c1c2b92624a14a33b4d9bc4b075fe9cecebb9679
-
SSDEEP
3072:JIJO91gvrt/YObLz6tTs6b/KItLvYFdJIwFAd/LWxidvIuV:H1OtgWLGtfb/1lviIkAdEid5
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1