General
-
Target
3fb3732041864cba98c47ac8434d9556
-
Size
142KB
-
Sample
231225-19c4bshfgr
-
MD5
3fb3732041864cba98c47ac8434d9556
-
SHA1
680efd0d20f38dfabcc98e287cdf1df49ee76c12
-
SHA256
be43ffca4e5f7cb4e7ae867096328dcd214a3e780388b44d49128024e1b9edde
-
SHA512
21e7322cd0acbad52d697e103c8d2e788985eb26248da32ee0ba20c667182f781335523ffebfe272e3c851cef0201c1ca488f0250cec54c8e8d310d3c6541930
-
SSDEEP
3072:AM01e1SDW35DH8H214YqVXjCmByk4u5v5c1smXzl:AMGeFpDcKP2XJBykAxX
Static task
static1
Behavioral task
behavioral1
Sample
3fb3732041864cba98c47ac8434d9556.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3fb3732041864cba98c47ac8434d9556.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:6655
29d46e6057c2d086410a0de13c00867e
-
reg_key
29d46e6057c2d086410a0de13c00867e
-
splitter
|'|'|
Targets
-
-
Target
3fb3732041864cba98c47ac8434d9556
-
Size
142KB
-
MD5
3fb3732041864cba98c47ac8434d9556
-
SHA1
680efd0d20f38dfabcc98e287cdf1df49ee76c12
-
SHA256
be43ffca4e5f7cb4e7ae867096328dcd214a3e780388b44d49128024e1b9edde
-
SHA512
21e7322cd0acbad52d697e103c8d2e788985eb26248da32ee0ba20c667182f781335523ffebfe272e3c851cef0201c1ca488f0250cec54c8e8d310d3c6541930
-
SSDEEP
3072:AM01e1SDW35DH8H214YqVXjCmByk4u5v5c1smXzl:AMGeFpDcKP2XJBykAxX
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1