General
-
Target
njRAT.zip
-
Size
349KB
-
Sample
240710-eqt2vaxgkc
-
MD5
8d6d88365875dde55078c005fc496370
-
SHA1
649d93d699164a5f4f1b8c5ee7088c67ca521af7
-
SHA256
00db602f19cde43d3f953560af9e3a94f76361b6c1274f8cd361c09fb56d93f8
-
SHA512
3f1e9cbb4ea938b3dd514b49af51dcf3827756fb679619171018c1fe562669602eb8f31b7d3ca1f1bbd58f1a900b55afdaf724d819172747a16eefe19516003b
-
SSDEEP
6144:YeAmDxawiyxe6x0esoo9/v6rF/U65Co/f3/neqBf4gkU5F6W6sGdfXM6m:YeAmownE66es7Yp/h/f3feqBkESO
Behavioral task
behavioral1
Sample
njRAT.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
njRAT.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
njRAT.exe
-
Size
959KB
-
MD5
0431311b5f024d6e66b90d59491f2563
-
SHA1
e9ff4da7e3f2199cbc16d37d8935cb1b0567ac2a
-
SHA256
fd624aa205517580e83fad7a4ce4d64863e95f62b34ac72647b1974a52822199
-
SHA512
d44b14e4b24e6e2d506ec32098488a16ebd5df57499ecd85e8878b8af2a3e1f9ed20d4125836417b702d0571f992aeac07af051dbf9268f48954556d17f51ee2
-
SSDEEP
12288:+O9vE3J7JO+xEPuc//9wivAmv6SAbnzmip2hGnadlFM4ZHOT2:+eXuczPCSGnzVjad1
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1