General
-
Target
njrat.exe
-
Size
37KB
-
Sample
230713-tl4staab9v
-
MD5
b67dbbab231bbbdee01a1b8065593516
-
SHA1
56032d41785075c8e28fdccf1175c8f86d7be2c4
-
SHA256
ed2003d66669252ab7181ce1479e9b0e898468b2eac1b8dc7247ec79cccdd57c
-
SHA512
abb5355c26205dd37560f73d14bb253d3f4c81dc3c2422170a5c3699230d66b1d1ae1a9d31ebe9b3c0859d13a3a5e5d55410d038c98543e203c503ab25f7cff2
-
SSDEEP
384:FxmFnqi0lJZtbH9KyM+2VzmiPZMsWerErAF+rMRTyN/0L+EcoinblneHQM3epzX+:7mSJ95M+2V6iqVe4rM+rMRa8NuWjt
Behavioral task
behavioral1
Sample
njrat.exe
Resource
win7-20230712-en
Malware Config
Extracted
njrat
im523
HacKed
alshareeftwtw-28524.portmap.host:28524
924cb29f21a270d4ac8a739405d54e60
-
reg_key
924cb29f21a270d4ac8a739405d54e60
-
splitter
|'|'|
Targets
-
-
Target
njrat.exe
-
Size
37KB
-
MD5
b67dbbab231bbbdee01a1b8065593516
-
SHA1
56032d41785075c8e28fdccf1175c8f86d7be2c4
-
SHA256
ed2003d66669252ab7181ce1479e9b0e898468b2eac1b8dc7247ec79cccdd57c
-
SHA512
abb5355c26205dd37560f73d14bb253d3f4c81dc3c2422170a5c3699230d66b1d1ae1a9d31ebe9b3c0859d13a3a5e5d55410d038c98543e203c503ab25f7cff2
-
SSDEEP
384:FxmFnqi0lJZtbH9KyM+2VzmiPZMsWerErAF+rMRTyN/0L+EcoinblneHQM3epzX+:7mSJ95M+2V6iqVe4rM+rMRa8NuWjt
-
Disables RegEdit via registry modification
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-