General
-
Target
JaffaCakes118_76e531d5c4e7ae6dd5df6e4eab140160
-
Size
23KB
-
Sample
250104-b74e3axkbn
-
MD5
76e531d5c4e7ae6dd5df6e4eab140160
-
SHA1
14d9fdd087c1b2e231d4fd50af680586dc7fdc3d
-
SHA256
f08c1e72d20df4164a4684c2b7f308b20be28f6849c9329449f874db3830f9c1
-
SHA512
0c65b3b67b472625a541b4acfaf388a77c832854aee36d98c0f06de58fceffbf4b374d93f93c782006b98c1c62b480c6c6b549c7bc2b4905afd7aeb67f5b3baf
-
SSDEEP
384:7QeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZ6r:85yBVd7RpcnuH
Behavioral task
behavioral1
Sample
JaffaCakes118_76e531d5c4e7ae6dd5df6e4eab140160.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_76e531d5c4e7ae6dd5df6e4eab140160.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
mohamad2050.ddns.net:1177
6be03d370f97e2b1871652a3bc1cc5e5
-
reg_key
6be03d370f97e2b1871652a3bc1cc5e5
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_76e531d5c4e7ae6dd5df6e4eab140160
-
Size
23KB
-
MD5
76e531d5c4e7ae6dd5df6e4eab140160
-
SHA1
14d9fdd087c1b2e231d4fd50af680586dc7fdc3d
-
SHA256
f08c1e72d20df4164a4684c2b7f308b20be28f6849c9329449f874db3830f9c1
-
SHA512
0c65b3b67b472625a541b4acfaf388a77c832854aee36d98c0f06de58fceffbf4b374d93f93c782006b98c1c62b480c6c6b549c7bc2b4905afd7aeb67f5b3baf
-
SSDEEP
384:7QeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZ6r:85yBVd7RpcnuH
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1