General
-
Target
JaffaCakes118_78a760b935860aae018637773e3ca060
-
Size
10KB
-
Sample
250104-j811bs1mgs
-
MD5
78a760b935860aae018637773e3ca060
-
SHA1
dee2033ad2a15d2244feafab8dc45914cf14bbf6
-
SHA256
1f47b620c6f768dd2cd3829a4e12e3709eeb42768df257b251214458d3301f79
-
SHA512
58a360f017f809cce2418c2f8469c127af45d54c25ba2d464b6602f33f6924831d395f89658a7c15804415504a8e71688c776c5da04f6e409728d54dfa8510ec
-
SSDEEP
192:GYgJqxLXAFVqk5QBZjfE2aHcrtaOiWni859xM2YF9hCRld5RcOhf0y26o:GxqxLXAakK1D8OxiC7MpM5iOh0ys
Behavioral task
behavioral1
Sample
1000.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1000.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
ailail07821532043.no-ip.biz:1177
9357b740612443fbb87cb8bfe74c902f
-
reg_key
9357b740612443fbb87cb8bfe74c902f
-
splitter
|'|'|
Targets
-
-
Target
1000.exe
-
Size
23KB
-
MD5
dccef00a6118f88b3d4d97714a6638fd
-
SHA1
b47aa7bed75794fbd67547222601cda76cc80a6d
-
SHA256
6938b477559cbdda70c83040c172bfcffd39c350d8ec4e2bc742c280ce8716ac
-
SHA512
d89a655d41da3a43dd67f297509b090463f4ec739eaf75665d2a6d958c2f08dd7409e1744b51e2f2108e27342d4617fd72d8fc4381710e63995fbc1076be6990
-
SSDEEP
384:wsqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZhg:HSoQA6mlcrRpcnu9
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1