General
-
Target
JaffaCakes118_6d75cf5e714666428d1900174feae850
-
Size
13KB
-
Sample
250103-scc33azlby
-
MD5
6d75cf5e714666428d1900174feae850
-
SHA1
dff4f26409836db2b988ee45ba05e2b5e2312272
-
SHA256
5741476f485ba80d40981e7795e978522a09a6b20b70026179fee62a2c282f45
-
SHA512
cb966b5dbe632554155d02b9e41377782b600283630389fd95ea9fb3d7e6b7c811f77cb3d4cfb685d58ca2005f85c6d82fa3bd84a2e44d11b5dbdc872a53fa54
-
SSDEEP
384:AikjD+7PRK9jtDrdAfnSJUskE3GNrwrjoww0hCiJfKPFefbnvY:ADD++jXAfXsjWYjCkCipKP2bg
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.6.4
HacKed
algerien10404.no-ip.org:1177
eaad395b717c9a7b58a9a841e1be3f92
-
reg_key
eaad395b717c9a7b58a9a841e1be3f92
-
splitter
|'|'|
Targets
-
-
Target
sample
-
Size
29KB
-
MD5
4597dea9793dd9aff61b4ac19c6b089e
-
SHA1
c777aa4ee4c5714ade8ae7f2f6e6d34c7f34f67a
-
SHA256
3827cd7438b47e7bb344d224ee5cfaf5af8dea40929af589c7c6e5b5352b1058
-
SHA512
6faf5653cb25715421cc018c5a9637e932b2d0b89ad24baa37d6c7b4e27e104eb72a7b2ee8699044cbb5e9303965cd9b920925ce0c2602ed58a1022cd2111fd2
-
SSDEEP
384:xPYs5l7VL9skVQ42BkkH5RYIGGmqDq9VXeXbGBsbh0w4wlAokw9OhgOL1vYRGOZ:xf7/skCXkmsIQq+VXeaBKh0p29SgRsl
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1