General
-
Target
4888-18-0x0000000000620000-0x0000000000630000-memory.dmp
-
Size
64KB
-
Sample
240215-qhmtcagb7s
-
MD5
63f4fb3117eec7a76778044173801874
-
SHA1
bf5b1e828352f3dc70f6587df7d6139868c6a06b
-
SHA256
63e968863f16c246ed6aedb0571d2a00ba906102e2ca8053555ff8dded8a256f
-
SHA512
618a6a4ab7ca55ec1ff9a1fb8a34b8d3281bc39f8de1c7685f439239fd8515047ca66960e94493d0d8efa526b44e5547f5cc73a6f9982560b89935b0ffec9b97
-
SSDEEP
768:MC9K6MpN/BizxNOZBs9RSLJFTvTJQmIDUu0tiBhjrY:D7gUczJtQVk+jc
Behavioral task
behavioral1
Sample
4888-18-0x0000000000620000-0x0000000000630000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4888-18-0x0000000000620000-0x0000000000630000-memory.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
njrat
0.7d
Update
llllllllllllllllllllllllllll.site:2222
b776413e4d59521efc868682834c8333
-
reg_key
b776413e4d59521efc868682834c8333
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
4888-18-0x0000000000620000-0x0000000000630000-memory.dmp
-
Size
64KB
-
MD5
63f4fb3117eec7a76778044173801874
-
SHA1
bf5b1e828352f3dc70f6587df7d6139868c6a06b
-
SHA256
63e968863f16c246ed6aedb0571d2a00ba906102e2ca8053555ff8dded8a256f
-
SHA512
618a6a4ab7ca55ec1ff9a1fb8a34b8d3281bc39f8de1c7685f439239fd8515047ca66960e94493d0d8efa526b44e5547f5cc73a6f9982560b89935b0ffec9b97
-
SSDEEP
768:MC9K6MpN/BizxNOZBs9RSLJFTvTJQmIDUu0tiBhjrY:D7gUczJtQVk+jc
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1