General
-
Target
JaffaCakes118_c7f8e1955a3787c90a3556ae14052f72
-
Size
31KB
-
Sample
250109-phe8ts1rbm
-
MD5
c7f8e1955a3787c90a3556ae14052f72
-
SHA1
d00c9189d6ee235071b732a1068c5419eb9e6ad4
-
SHA256
ae1383eb4d9bdf82e292bb96095fb8e46ffe89064c9b1da69a75cc9489123b13
-
SHA512
bdf289ecf647b4b9abb2f3a19ad97a88f1090087e92d468e235c5447f58b678eff11fad4c3406c9cbea129fbb96cab852d9aad07b931e5a436af0cb74ea20310
-
SSDEEP
768:T98p5d5rLmzxBuJJKye8nu4LPv67QmIDUu0ti78j:SvKO+4jwQVkNj
Behavioral task
behavioral1
Sample
JaffaCakes118_c7f8e1955a3787c90a3556ae14052f72.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c7f8e1955a3787c90a3556ae14052f72.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
Hack
127.0.0.1:4444
95eba3b7e91ae89ec0605b1877e931a7
-
reg_key
95eba3b7e91ae89ec0605b1877e931a7
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
JaffaCakes118_c7f8e1955a3787c90a3556ae14052f72
-
Size
31KB
-
MD5
c7f8e1955a3787c90a3556ae14052f72
-
SHA1
d00c9189d6ee235071b732a1068c5419eb9e6ad4
-
SHA256
ae1383eb4d9bdf82e292bb96095fb8e46ffe89064c9b1da69a75cc9489123b13
-
SHA512
bdf289ecf647b4b9abb2f3a19ad97a88f1090087e92d468e235c5447f58b678eff11fad4c3406c9cbea129fbb96cab852d9aad07b931e5a436af0cb74ea20310
-
SSDEEP
768:T98p5d5rLmzxBuJJKye8nu4LPv67QmIDUu0ti78j:SvKO+4jwQVkNj
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1