General
-
Target
67d53f087b54148e866b6bfc1108e51e46ab82fc1ecaa82212c666ce26c2472d
-
Size
93KB
-
Sample
240706-2p1vbsxflc
-
MD5
54818a1a77471d6b2edd5ca5708247e3
-
SHA1
c2db96c79e4e117caa6e7db3dfc767f2f9c9e90f
-
SHA256
67d53f087b54148e866b6bfc1108e51e46ab82fc1ecaa82212c666ce26c2472d
-
SHA512
75bb0460c96e5f2983e9344864b06696054f8f0fdde5d3f4d2758bea6004c3c8e151c8d013a3a6ec5220d205f9f75b3dace903b18157953445e18cf256faae9b
-
SSDEEP
768:FY3XKBD9O/pBcxYsbae6GIXb9pDX2b98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3+sGy:UKzOx6baIa9RPj00ljEwzGi1dD6D8gS
Behavioral task
behavioral1
Sample
67d53f087b54148e866b6bfc1108e51e46ab82fc1ecaa82212c666ce26c2472d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67d53f087b54148e866b6bfc1108e51e46ab82fc1ecaa82212c666ce26c2472d.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:5552
fb116b75140ecc0173c4ba46bdb8d155
-
reg_key
fb116b75140ecc0173c4ba46bdb8d155
-
splitter
|'|'|
Targets
-
-
Target
67d53f087b54148e866b6bfc1108e51e46ab82fc1ecaa82212c666ce26c2472d
-
Size
93KB
-
MD5
54818a1a77471d6b2edd5ca5708247e3
-
SHA1
c2db96c79e4e117caa6e7db3dfc767f2f9c9e90f
-
SHA256
67d53f087b54148e866b6bfc1108e51e46ab82fc1ecaa82212c666ce26c2472d
-
SHA512
75bb0460c96e5f2983e9344864b06696054f8f0fdde5d3f4d2758bea6004c3c8e151c8d013a3a6ec5220d205f9f75b3dace903b18157953445e18cf256faae9b
-
SSDEEP
768:FY3XKBD9O/pBcxYsbae6GIXb9pDX2b98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3+sGy:UKzOx6baIa9RPj00ljEwzGi1dD6D8gS
Score8/10-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1