General
-
Target
5bd90bab4c21a7ffe6185129ffb2d587e50649ede3eecbd049cbcf0de7d0ca95
-
Size
116KB
-
Sample
240610-2dhvdatakb
-
MD5
c34c8d13e462af75786dc8addd523429
-
SHA1
9ce940c13b129ea3b778d3e23aad7b5c7ea40d27
-
SHA256
5bd90bab4c21a7ffe6185129ffb2d587e50649ede3eecbd049cbcf0de7d0ca95
-
SHA512
f8ac7804fcd73033cad5578193caf0055b4a0b3babb711859194f1b6ba5f48ccaed0d77cf38c4b970b07b1da823631d5dd6ec49ff46b3a08107d3154b8bb0dd7
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14P:P5eznsjsguGDFqGZ2rDL14P
Static task
static1
Behavioral task
behavioral1
Sample
5bd90bab4c21a7ffe6185129ffb2d587e50649ede3eecbd049cbcf0de7d0ca95.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5bd90bab4c21a7ffe6185129ffb2d587e50649ede3eecbd049cbcf0de7d0ca95.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
5bd90bab4c21a7ffe6185129ffb2d587e50649ede3eecbd049cbcf0de7d0ca95
-
Size
116KB
-
MD5
c34c8d13e462af75786dc8addd523429
-
SHA1
9ce940c13b129ea3b778d3e23aad7b5c7ea40d27
-
SHA256
5bd90bab4c21a7ffe6185129ffb2d587e50649ede3eecbd049cbcf0de7d0ca95
-
SHA512
f8ac7804fcd73033cad5578193caf0055b4a0b3babb711859194f1b6ba5f48ccaed0d77cf38c4b970b07b1da823631d5dd6ec49ff46b3a08107d3154b8bb0dd7
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14P:P5eznsjsguGDFqGZ2rDL14P
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1