General
-
Target
99ece485b86961597abf8a710eb239f12fc1d7952cf4cb7e5c5df997e1dd96a3
-
Size
116KB
-
Sample
240616-axw3ka1hkh
-
MD5
01fd7c260144e43f934a18b6ebdec174
-
SHA1
56046e01bf3040b681cada52b7ea6664044060b1
-
SHA256
99ece485b86961597abf8a710eb239f12fc1d7952cf4cb7e5c5df997e1dd96a3
-
SHA512
006ecbbcb0ad52bf1967848da3e1f460ea1b64ecc5259c95e9ab827183e0a70517f94642c0b9c93906f3bd55241cef6263d220f84b07064e6f6cedd6af61caa3
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLZZ:P5eznsjsguGDFqGZ2rDL/
Static task
static1
Behavioral task
behavioral1
Sample
99ece485b86961597abf8a710eb239f12fc1d7952cf4cb7e5c5df997e1dd96a3.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
99ece485b86961597abf8a710eb239f12fc1d7952cf4cb7e5c5df997e1dd96a3.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
99ece485b86961597abf8a710eb239f12fc1d7952cf4cb7e5c5df997e1dd96a3
-
Size
116KB
-
MD5
01fd7c260144e43f934a18b6ebdec174
-
SHA1
56046e01bf3040b681cada52b7ea6664044060b1
-
SHA256
99ece485b86961597abf8a710eb239f12fc1d7952cf4cb7e5c5df997e1dd96a3
-
SHA512
006ecbbcb0ad52bf1967848da3e1f460ea1b64ecc5259c95e9ab827183e0a70517f94642c0b9c93906f3bd55241cef6263d220f84b07064e6f6cedd6af61caa3
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLZZ:P5eznsjsguGDFqGZ2rDL/
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1