General
-
Target
5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe
-
Size
114KB
-
Sample
240522-b4l2lsgc79
-
MD5
4be9986eb800ea45ff736671e9756ffe
-
SHA1
e30372bd80efe2da17d21e4026ab2a42b1572290
-
SHA256
5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6
-
SHA512
4fb83428ad5899f2134dad76fb4c098b5037d1c0e5d8924741fab9d75b003838b15756cd4016cdfd99da82ff6913d6d6efc7ae9f3beaa1995346ef0ef5d46d22
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMiat6QK:P5eznsjsguGDFqGZ2rih
Static task
static1
Behavioral task
behavioral1
Sample
5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe
-
Size
114KB
-
MD5
4be9986eb800ea45ff736671e9756ffe
-
SHA1
e30372bd80efe2da17d21e4026ab2a42b1572290
-
SHA256
5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6
-
SHA512
4fb83428ad5899f2134dad76fb4c098b5037d1c0e5d8924741fab9d75b003838b15756cd4016cdfd99da82ff6913d6d6efc7ae9f3beaa1995346ef0ef5d46d22
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMiat6QK:P5eznsjsguGDFqGZ2rih
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1