General
-
Target
7d4bb5f2e9960068fbd228ec9c08c325
-
Size
402KB
-
Sample
240128-sjb5cacbg6
-
MD5
7d4bb5f2e9960068fbd228ec9c08c325
-
SHA1
0acee3be09d5b2fe2713dcdd15e32e70db8a69b9
-
SHA256
6d62984c3d63455de874c3fdcbd9ed0a691d42e8ba72aa586716355c9204c77c
-
SHA512
1c34a60cfb6e36178fbb9e81886fb38612582a12bdfc814a489d26f12aeb99e3b5dcfd56ed92602ca5cd03dc6e1eb50a006b965f9dead0d8625b49bdee466f34
-
SSDEEP
6144:rmaKVBGmE84IMNv55giU0pKiFYHxfx15RvOagakZBxkTN2gmeGcFnVQb/DAYbDgU:wSmLAuEY71fviagATFmebVQDcYcg
Behavioral task
behavioral1
Sample
7d4bb5f2e9960068fbd228ec9c08c325.exe
Resource
win7-20231129-en
Malware Config
Extracted
njrat
0.6.4
hhhmach.ddns.net:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Targets
-
-
Target
7d4bb5f2e9960068fbd228ec9c08c325
-
Size
402KB
-
MD5
7d4bb5f2e9960068fbd228ec9c08c325
-
SHA1
0acee3be09d5b2fe2713dcdd15e32e70db8a69b9
-
SHA256
6d62984c3d63455de874c3fdcbd9ed0a691d42e8ba72aa586716355c9204c77c
-
SHA512
1c34a60cfb6e36178fbb9e81886fb38612582a12bdfc814a489d26f12aeb99e3b5dcfd56ed92602ca5cd03dc6e1eb50a006b965f9dead0d8625b49bdee466f34
-
SSDEEP
6144:rmaKVBGmE84IMNv55giU0pKiFYHxfx15RvOagakZBxkTN2gmeGcFnVQb/DAYbDgU:wSmLAuEY71fviagATFmebVQDcYcg
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1