General
-
Target
njrat.exe
-
Size
12.0MB
-
Sample
230820-r7p6fafh46
-
MD5
346268be76f8fa86a5dad611198cd8be
-
SHA1
a4af910fc86213da4bf3192f2ded04a43b3b3808
-
SHA256
00d82a10e0816bb95311695ce103eac885ac1df076766ff490f9d27e01d7e381
-
SHA512
908ce5c52dff8086f0045d5ca9555f3d20fe8cd433590e52ba5255e85130e4d550298d50887f66d3ee0cd245bbf3bbdee70d483e8c4d3ec792efbd01647173fe
-
SSDEEP
196608:3CQsGbT/9bvLz3S1bA329Oq5UWrlwsGUC:EGbTlj3S1bO29Oq5UWpwsGUC
Static task
static1
Behavioral task
behavioral1
Sample
njrat.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
njrat.exe
-
Size
12.0MB
-
MD5
346268be76f8fa86a5dad611198cd8be
-
SHA1
a4af910fc86213da4bf3192f2ded04a43b3b3808
-
SHA256
00d82a10e0816bb95311695ce103eac885ac1df076766ff490f9d27e01d7e381
-
SHA512
908ce5c52dff8086f0045d5ca9555f3d20fe8cd433590e52ba5255e85130e4d550298d50887f66d3ee0cd245bbf3bbdee70d483e8c4d3ec792efbd01647173fe
-
SSDEEP
196608:3CQsGbT/9bvLz3S1bA329Oq5UWrlwsGUC:EGbTlj3S1bO29Oq5UWpwsGUC
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-