General
-
Target
8fa0588a7d0bdc6ed5cd187ab077cdfed96f0cb1341b37e5000a5a40bbc7345e.zip
-
Size
166KB
-
Sample
231008-jct7xaaf2z
-
MD5
cdb8442ef329f1cce8e6e946c3323c7e
-
SHA1
0da32507b2d6a7b885d6083e2fac9883a6a00478
-
SHA256
4343db61e059b8f73e97e022907d917a6a495439cf9ef7c618a832ded1f9f4d1
-
SHA512
d05877897af51ff2d062b6069f07ec87a411a6887dc84f070b168bfb69cf089a45dc1d65009a5107df926bb4238c9d7747b910a7801686c8250e6e5c8d34d70e
-
SSDEEP
3072:pgAfoMcj+2MZ6qGe68u2EZNVXvYImr1uX8Kp76aOKPvdkYAmK442tBB1SGIkS:pzAvIQne/u2+/Y/rwZpmaO4bp42tBBI
Static task
static1
Behavioral task
behavioral1
Sample
8fa0588a7d0bdc6ed5cd187ab077cdfed96f0cb1341b37e5000a5a40bbc7345e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8fa0588a7d0bdc6ed5cd187ab077cdfed96f0cb1341b37e5000a5a40bbc7345e.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
njrat
0.7d
HacKed
z-shadowxxx.ddns.net:5552
1899f7b6bb5e1cf84a5b2c830a70fbec
-
reg_key
1899f7b6bb5e1cf84a5b2c830a70fbec
-
splitter
|'|'|
Targets
-
-
Target
8fa0588a7d0bdc6ed5cd187ab077cdfed96f0cb1341b37e5000a5a40bbc7345e
-
Size
344KB
-
MD5
8d25c14a5b1f9cdf8f87b86481dbc471
-
SHA1
af7d5f5f0f4b891b4e95dd444993138b581a69d4
-
SHA256
8fa0588a7d0bdc6ed5cd187ab077cdfed96f0cb1341b37e5000a5a40bbc7345e
-
SHA512
6fb3dbde57e30fa8d04f3a4081312bee32fe576b73dea496c7782a02dc82e3173d49a9dd13489d7acb879744ff3c96acc81efaabbff089354fcbbe00f3167338
-
SSDEEP
3072:FEaNdCsfYDogE/eaBNDjh8b5hisx0x0a37K0OMwRbHpG9ua7zwo58T:FEAdCs3XLBtjhij0xfm0VKG9oy
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1