General
-
Target
20c291ce22e552c46474b8ff8830eeaff52a9aa7fb84c8880c518e546da445b0
-
Size
110KB
-
Sample
240618-x4h6lsvdrd
-
MD5
7f39936811f38236dc41bdf86610e38b
-
SHA1
f6cba3a3c2b1067cb1a5a737378d9e14ab13829f
-
SHA256
20c291ce22e552c46474b8ff8830eeaff52a9aa7fb84c8880c518e546da445b0
-
SHA512
dadeb00e79517e61903ea7db543a2e7c55081fa3c8e1b87055ef16072f9d2489c68080158f1fb65cc4bb12b4e61a4c303d6d17ca1e50e7ec4910a5a654cb488f
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73W0:w5eznsjsguGDFqGx8egoxmO3rW0
Static task
static1
Behavioral task
behavioral1
Sample
20c291ce22e552c46474b8ff8830eeaff52a9aa7fb84c8880c518e546da445b0.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
20c291ce22e552c46474b8ff8830eeaff52a9aa7fb84c8880c518e546da445b0.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
20c291ce22e552c46474b8ff8830eeaff52a9aa7fb84c8880c518e546da445b0
-
Size
110KB
-
MD5
7f39936811f38236dc41bdf86610e38b
-
SHA1
f6cba3a3c2b1067cb1a5a737378d9e14ab13829f
-
SHA256
20c291ce22e552c46474b8ff8830eeaff52a9aa7fb84c8880c518e546da445b0
-
SHA512
dadeb00e79517e61903ea7db543a2e7c55081fa3c8e1b87055ef16072f9d2489c68080158f1fb65cc4bb12b4e61a4c303d6d17ca1e50e7ec4910a5a654cb488f
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73W0:w5eznsjsguGDFqGx8egoxmO3rW0
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1