General
-
Target
JaffaCakes118_6d5ee70fad22d6b4ab7c1bc462e79670
-
Size
179KB
-
Sample
250103-r3dxlsskhp
-
MD5
6d5ee70fad22d6b4ab7c1bc462e79670
-
SHA1
f4ac06aa219cb4b97e480e83a1b069f3e8408608
-
SHA256
c76495023894a45401ea163bde2bc84fb8d980d5863b83b42399a7ad627c0db5
-
SHA512
da99968236b176d78c7d8ac3505f58b4ee3bdcfc9ba4aa040616a9797e7d7ee52abe8eee0f09da7150637591605d19b79fead27d9d30ede50d44c9f001dd2c19
-
SSDEEP
3072:JPzVfsNDKRtnYXGCRCoyx4wnExKMrZMsqZJbbsqQRnpA0UJU3FtWWHfvEaSf/iUc:dzVfsNORvRonwnMvq2RndEkwFajGW3
Static task
static1
Behavioral task
behavioral1
Sample
ddoser.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ddoser.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
helpme.no-ip.org:125
d3ebde779cbee84dd0766682e20bc01a
-
reg_key
d3ebde779cbee84dd0766682e20bc01a
-
splitter
|'|'|
Targets
-
-
Target
ddoser.exe
-
Size
281KB
-
MD5
de48356fb8a7fa2570780ae5dbdfdab1
-
SHA1
47aa1a6f2819d5a7b7c0b33bb80192baf7945e12
-
SHA256
3ef8d2346a9ef2401693b3333ee0cc9e832d17995d0ff3e91addf540ff7b4331
-
SHA512
8000cbef63ec9e6cddee5cdfd897080b2c4cf0691ddd965fefdb5b6a4853d17a37a2227ecb58391f96993b05dd49e5094f3a8e2f87fcf7b18daddf34f7f02b86
-
SSDEEP
6144:oAuR/sh1xjHRonwn6vqCdOiALj1s/jdsG9Z5vZ5vCUC7tz82FyaR:iJsh177nirOketz82
-
Njrat family
-
Modifies Windows Firewall
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1