General
-
Target
JaffaCakes118_778d851ee285deb89998b5578988f810
-
Size
16KB
-
Sample
250104-esqr7stkbr
-
MD5
778d851ee285deb89998b5578988f810
-
SHA1
ad6dd4cb0d344a22fc4e88205a9a2d5432c4e7b4
-
SHA256
d0518ad96b2c42c799f9f0dc50f9043c7881095c5c17c068c44241b808e10988
-
SHA512
10df7ef0d84fac4e4e5ba39b531afd255af52f4aa8570a3aa1fa643386c0cbcf77934c8bf6f71bacb9314a24a2b285d07946ddf35319a60a7778b529edaf0221
-
SSDEEP
384:vxg+tkmi2R1PcDwj75UcKYsbm6k7PVFw2K4noN91JJ4jE1:y0kkR1UDq7xKYomH7tFw2K44AE1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.6.4
HacKed
blackmagix.no-ip.org:1177
a49931bd13ad32f9534c94e1f51783c7
-
reg_key
a49931bd13ad32f9534c94e1f51783c7
-
splitter
|'|'|
Targets
-
-
Target
sample
-
Size
29KB
-
MD5
2a8847ebfe7ab2f15d166640d196b9ab
-
SHA1
5855abd2d9e15c9a7dfc96b08b737fe664433478
-
SHA256
19e0a51ad19bda6e5ddd16b4d3954dc959b832b3cd8c23478ee3524015bca350
-
SHA512
fcfc0077d8a40f1996b7eca425045c9f37ae28bd78b5dbf617fdd8cecd3162b603d968523e30ba04182989049b66dd41fde5f35edc54a12f10f9f82571075f7b
-
SSDEEP
768:j7RmpgGD1BH9D8qbILeuBKh0p29SgRs2:j7RKIcIrKhG29js2
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1