General
-
Target
5fe9610700dd0d31d371b9bf25f578a64f31333ee65cfb2227d34d80d4600bbf
-
Size
108KB
-
Sample
240419-116dhshf4s
-
MD5
714adf5c7a166fb1abda0f7addb090c3
-
SHA1
ecbd575fdaba56a519f65344c4e38a1aa7035881
-
SHA256
5fe9610700dd0d31d371b9bf25f578a64f31333ee65cfb2227d34d80d4600bbf
-
SHA512
f55f7be930285ddbd3acd2002ca8ee59b2464cf57cc728384d9e4c03af84062d0fc05f59dc95856484a5543fedd58189bbb2f9077851588be9699ebe3337b53e
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh738:w5eznsjsguGDFqGx8egoxmO3r8
Static task
static1
Behavioral task
behavioral1
Sample
5fe9610700dd0d31d371b9bf25f578a64f31333ee65cfb2227d34d80d4600bbf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5fe9610700dd0d31d371b9bf25f578a64f31333ee65cfb2227d34d80d4600bbf.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
5fe9610700dd0d31d371b9bf25f578a64f31333ee65cfb2227d34d80d4600bbf
-
Size
108KB
-
MD5
714adf5c7a166fb1abda0f7addb090c3
-
SHA1
ecbd575fdaba56a519f65344c4e38a1aa7035881
-
SHA256
5fe9610700dd0d31d371b9bf25f578a64f31333ee65cfb2227d34d80d4600bbf
-
SHA512
f55f7be930285ddbd3acd2002ca8ee59b2464cf57cc728384d9e4c03af84062d0fc05f59dc95856484a5543fedd58189bbb2f9077851588be9699ebe3337b53e
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh738:w5eznsjsguGDFqGx8egoxmO3r8
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1