General
-
Target
1de7eb7a3b3f987c9826c23bf38e1aa4.bin
-
Size
61KB
-
Sample
240604-bm4kbsga7x
-
MD5
09c3fb7856da1776efc103d333a371fd
-
SHA1
b276e1bb7cc937dff23d7507d6d257751911aacf
-
SHA256
a711ffc2afac8903b9cb8762cdf5296552930cb0f43cb555c0f2ce4e327f8465
-
SHA512
4b2930b129550e069312ee81c12945e264196d6d01bbc12c0cf0595c2acd3fc4ab12af60f4869d3d035110e70b5deb6a3cd569da67ee3f1e7ae7824c630fb73b
-
SSDEEP
1536:aoorar/RVVznuiiX4UHVruhw4gcL4wxCAHH0lQ9D6frarNE:j8IupX4UH5u64g9wx5ntJG
Static task
static1
Behavioral task
behavioral1
Sample
fb92f4bcee1c79fb56625d8c7a4f3e1f3b6cee63567eb49b6138ef5224ba5486.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb92f4bcee1c79fb56625d8c7a4f3e1f3b6cee63567eb49b6138ef5224ba5486.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
fb92f4bcee1c79fb56625d8c7a4f3e1f3b6cee63567eb49b6138ef5224ba5486.exe
-
Size
115KB
-
MD5
1de7eb7a3b3f987c9826c23bf38e1aa4
-
SHA1
34cc55771ab42b0b53f804fa0fb670c49bb7da89
-
SHA256
fb92f4bcee1c79fb56625d8c7a4f3e1f3b6cee63567eb49b6138ef5224ba5486
-
SHA512
a102ee6311c260d7deac6e81f9f43f6616b3d47b07a2a5b4a26518624648bacca05be23054b66ae35d1b1782b4a179c8d5ee0e947431d0b15a5df103791856d9
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDQgd:P5eznsjsguGDFqGZ2rDtd
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1