General
-
Target
1ee59cd6889f01d2a7b4db51061647d4
-
Size
32KB
-
Sample
231230-2p7b4sefgm
-
MD5
1ee59cd6889f01d2a7b4db51061647d4
-
SHA1
a060f5e2ddc960e0e875bb2d51c03c25005aec29
-
SHA256
f8598e1c8e9c9f77ad9352ec4775c3201eb41bff83ec38f336639a229bd3b29c
-
SHA512
9dcd2d836b4be5bbd8997374544a3080c468c5799b0423beb9b929873be93f993cc4f8ab3d7249e320a1b11d5b30294d6bd6fa8e4bb7d852ec69c9fd38a44c14
-
SSDEEP
768:xg54FuhOvsYEolLnsq+OzVlgpuoVo/aYclHnDyman:pFucvsnoWXCTwuso/a3ljyZ
Static task
static1
Behavioral task
behavioral1
Sample
1ee59cd6889f01d2a7b4db51061647d4.exe
Resource
win7-20231215-en
Malware Config
Extracted
njrat
0.7d
security
192.168.162.129:4444
a060718d98f6fd31b221f0ea5860dce7
-
reg_key
a060718d98f6fd31b221f0ea5860dce7
-
splitter
|'|'|
Targets
-
-
Target
1ee59cd6889f01d2a7b4db51061647d4
-
Size
32KB
-
MD5
1ee59cd6889f01d2a7b4db51061647d4
-
SHA1
a060f5e2ddc960e0e875bb2d51c03c25005aec29
-
SHA256
f8598e1c8e9c9f77ad9352ec4775c3201eb41bff83ec38f336639a229bd3b29c
-
SHA512
9dcd2d836b4be5bbd8997374544a3080c468c5799b0423beb9b929873be93f993cc4f8ab3d7249e320a1b11d5b30294d6bd6fa8e4bb7d852ec69c9fd38a44c14
-
SSDEEP
768:xg54FuhOvsYEolLnsq+OzVlgpuoVo/aYclHnDyman:pFucvsnoWXCTwuso/a3ljyZ
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1