General
-
Target
3e124508b39b68317375be75c14e7ff8.exe
-
Size
115KB
-
Sample
240521-t47mesbh38
-
MD5
3e124508b39b68317375be75c14e7ff8
-
SHA1
b885c4facabfd60e597857f45c97a3a4b47dcc29
-
SHA256
ff4501dcfc5f1f6ab5c50195d053191d54290d2efc160def4de7af2b2c1f7039
-
SHA512
81a35f10a3adfa1635c0957c69f9a0e6688e1e818144169696e018a0c0bc62b3196c3e5930216b0fc81cd68b0441261b5cb428054bad8a7b0e2b56a122e06670
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL0:P5eznsjsguGDFqGZ2rDL0
Static task
static1
Behavioral task
behavioral1
Sample
3e124508b39b68317375be75c14e7ff8.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3e124508b39b68317375be75c14e7ff8.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
3e124508b39b68317375be75c14e7ff8.exe
-
Size
115KB
-
MD5
3e124508b39b68317375be75c14e7ff8
-
SHA1
b885c4facabfd60e597857f45c97a3a4b47dcc29
-
SHA256
ff4501dcfc5f1f6ab5c50195d053191d54290d2efc160def4de7af2b2c1f7039
-
SHA512
81a35f10a3adfa1635c0957c69f9a0e6688e1e818144169696e018a0c0bc62b3196c3e5930216b0fc81cd68b0441261b5cb428054bad8a7b0e2b56a122e06670
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL0:P5eznsjsguGDFqGZ2rDL0
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1