General
-
Target
ef328edd2d4d563795b868ef451eaa0727bc876990b50efc7129365f0459acd4.exe
-
Size
5.1MB
-
Sample
231202-lpl36sbe8t
-
MD5
123ef258fdaed181fa78d002b467d542
-
SHA1
665fe2c0e02f831622479da806ad27672cd3ad27
-
SHA256
ef328edd2d4d563795b868ef451eaa0727bc876990b50efc7129365f0459acd4
-
SHA512
0db79b1a968cc34c97162001edf9934805664c6283aa0291d7f9d6134a60e2f9bcaf59e6fa2a68647b86d89766cd70d903868ff2958c26f48b3da38d9758a161
-
SSDEEP
98304:G6ejxyd7f7l5dV9mHl8PpR2HQVal+YBtoCgjaG41qYfyXbutpUwLUH:1ek1f7lvmmnJ1YBtzgjax1XfyCtpC
Static task
static1
Behavioral task
behavioral1
Sample
ef328edd2d4d563795b868ef451eaa0727bc876990b50efc7129365f0459acd4.exe
Resource
win7-20231129-en
Malware Config
Extracted
njrat
0.7d
Vitima
thzinhacker.ddns.net:1177
08fe52ffc2ee55ca1a921b0f37e5d553
-
reg_key
08fe52ffc2ee55ca1a921b0f37e5d553
-
splitter
|'|'|
Extracted
njrat
0.7d
Lammer
year-tim.gl.at.ply.gg:24149
7387484ed8415a659d037115f54484ef
-
reg_key
7387484ed8415a659d037115f54484ef
-
splitter
|'|'|
Targets
-
-
Target
ef328edd2d4d563795b868ef451eaa0727bc876990b50efc7129365f0459acd4.exe
-
Size
5.1MB
-
MD5
123ef258fdaed181fa78d002b467d542
-
SHA1
665fe2c0e02f831622479da806ad27672cd3ad27
-
SHA256
ef328edd2d4d563795b868ef451eaa0727bc876990b50efc7129365f0459acd4
-
SHA512
0db79b1a968cc34c97162001edf9934805664c6283aa0291d7f9d6134a60e2f9bcaf59e6fa2a68647b86d89766cd70d903868ff2958c26f48b3da38d9758a161
-
SSDEEP
98304:G6ejxyd7f7l5dV9mHl8PpR2HQVal+YBtoCgjaG41qYfyXbutpUwLUH:1ek1f7lvmmnJ1YBtzgjax1XfyCtpC
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1