General
-
Target
1428-90-0x00000000004D0000-0x00000000004DC000-memory.dmp
-
Size
48KB
-
Sample
240523-s53t7agb77
-
MD5
201fcb317da055d1a3c50055b20612fa
-
SHA1
54ff456107efc569d9e0f4472c94c582f6eebd11
-
SHA256
404ddbce422f18a4f342ff53b1114c7c30b6d35474b8e9082ccf6b120936f786
-
SHA512
87d2791541a2b54f6a5c6535f48cf03c6a91183ced133682ade3eb634c2ada9cda7dd3e72f5c81e41354fe6c0c36b39d51e3335ea06dcbb6947f5cdd32c9ae6d
-
SSDEEP
384:TqbjqhfPjAPYQMWSN4hxMEcBXugc2mMTAKZqP+xcV+ocGJN8/S3MqkvzghX:+nqdqJSwr44/EqioSKBmM
Behavioral task
behavioral1
Sample
1428-90-0x00000000004D0000-0x00000000004DC000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1428-90-0x00000000004D0000-0x00000000004DC000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
0.7d
HacKed
icpanel.hackcrack.io:40544
Windows Explorer
-
reg_key
Windows Explorer
-
splitter
|'|'|
Targets
-
-
Target
1428-90-0x00000000004D0000-0x00000000004DC000-memory.dmp
-
Size
48KB
-
MD5
201fcb317da055d1a3c50055b20612fa
-
SHA1
54ff456107efc569d9e0f4472c94c582f6eebd11
-
SHA256
404ddbce422f18a4f342ff53b1114c7c30b6d35474b8e9082ccf6b120936f786
-
SHA512
87d2791541a2b54f6a5c6535f48cf03c6a91183ced133682ade3eb634c2ada9cda7dd3e72f5c81e41354fe6c0c36b39d51e3335ea06dcbb6947f5cdd32c9ae6d
-
SSDEEP
384:TqbjqhfPjAPYQMWSN4hxMEcBXugc2mMTAKZqP+xcV+ocGJN8/S3MqkvzghX:+nqdqJSwr44/EqioSKBmM
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1