General
-
Target
6e323bddb6f10b049428e50b9cf4da9f047829e83aa32e00bb2a7f4dc2a5e588.exe
-
Size
23KB
-
Sample
231231-wp4y4abghq
-
MD5
56b932581ca03686ad499fad655f6657
-
SHA1
4a5b99528438aa27cd2608f7be56bfd314d39f26
-
SHA256
6e323bddb6f10b049428e50b9cf4da9f047829e83aa32e00bb2a7f4dc2a5e588
-
SHA512
e04c20a01cef5987340e6f40da5e8aeaf52952ccbe10b1eb538a612bba75b45c91988d8014b2eb42ed742c29e5d0a152f969e1b9656846d2f9117faae9e7197c
-
SSDEEP
384:RoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZdfZU:G7O89p2rRpcnuMhU
Behavioral task
behavioral1
Sample
6e323bddb6f10b049428e50b9cf4da9f047829e83aa32e00bb2a7f4dc2a5e588.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6e323bddb6f10b049428e50b9cf4da9f047829e83aa32e00bb2a7f4dc2a5e588.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
njrat
0.7d
HHHXXX
black101.ddns.net:1177
c7c947d665980e197b736d98adf01cc0
-
reg_key
c7c947d665980e197b736d98adf01cc0
-
splitter
|'|'|
Targets
-
-
Target
6e323bddb6f10b049428e50b9cf4da9f047829e83aa32e00bb2a7f4dc2a5e588.exe
-
Size
23KB
-
MD5
56b932581ca03686ad499fad655f6657
-
SHA1
4a5b99528438aa27cd2608f7be56bfd314d39f26
-
SHA256
6e323bddb6f10b049428e50b9cf4da9f047829e83aa32e00bb2a7f4dc2a5e588
-
SHA512
e04c20a01cef5987340e6f40da5e8aeaf52952ccbe10b1eb538a612bba75b45c91988d8014b2eb42ed742c29e5d0a152f969e1b9656846d2f9117faae9e7197c
-
SSDEEP
384:RoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZdfZU:G7O89p2rRpcnuMhU
Score10/10-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1