General
-
Target
3ce2612c8d59e06c0aac8e466e37efd8d07a2c4c91e5c894e44d8ec069aac668.exe
-
Size
23KB
-
Sample
240523-seaqqafb6w
-
MD5
ef3997fba7e285c97c28140e51928249
-
SHA1
66734f8816697b868d9dd1dafb49ad1c3a153755
-
SHA256
3ce2612c8d59e06c0aac8e466e37efd8d07a2c4c91e5c894e44d8ec069aac668
-
SHA512
5422450cc95c23bffd47ba84acd489ac3997ffdb3851c167fb6925ca011afa0be5d0ed0a619b095cd3ee1f52ea9d14000e864b2cd577ab301ee65714cc7c1966
-
SSDEEP
384:68aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZZr:9Xcwt3tRpcnu6
Behavioral task
behavioral1
Sample
3ce2612c8d59e06c0aac8e466e37efd8d07a2c4c91e5c894e44d8ec069aac668.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ce2612c8d59e06c0aac8e466e37efd8d07a2c4c91e5c894e44d8ec069aac668.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
njrat
0.7d
t1
10.9.203.254:3131
969f98392400891a1a1da27da68a2a1d
-
reg_key
969f98392400891a1a1da27da68a2a1d
-
splitter
|'|'|
Targets
-
-
Target
3ce2612c8d59e06c0aac8e466e37efd8d07a2c4c91e5c894e44d8ec069aac668.exe
-
Size
23KB
-
MD5
ef3997fba7e285c97c28140e51928249
-
SHA1
66734f8816697b868d9dd1dafb49ad1c3a153755
-
SHA256
3ce2612c8d59e06c0aac8e466e37efd8d07a2c4c91e5c894e44d8ec069aac668
-
SHA512
5422450cc95c23bffd47ba84acd489ac3997ffdb3851c167fb6925ca011afa0be5d0ed0a619b095cd3ee1f52ea9d14000e864b2cd577ab301ee65714cc7c1966
-
SSDEEP
384:68aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZZr:9Xcwt3tRpcnu6
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1