General
-
Target
3fed82eee5314ec6282be309f63582b1a3ad0d334e048f973d7fe832ff3fe943.exe
-
Size
329KB
-
Sample
240811-blj5assckb
-
MD5
9d509cf97138b882335dd50f0a0c34d9
-
SHA1
3ad0963d838afe0a59d2bd42890b7ff033910cf6
-
SHA256
3fed82eee5314ec6282be309f63582b1a3ad0d334e048f973d7fe832ff3fe943
-
SHA512
67e83ea00bf2e291648fd4a017f566fde4592c19d6a09d67ee097c907aa6cfaa36085ea2dcdf6ef0ff6888453fc496a0c48298414cd07096a1b20e0eb66290d0
-
SSDEEP
6144:+AAeB34B2Dh19wMY8o/WNOKXOdFefVbYuRpANbhIDeP:+i3XwDON+oG0pD8
Static task
static1
Behavioral task
behavioral1
Sample
3fed82eee5314ec6282be309f63582b1a3ad0d334e048f973d7fe832ff3fe943.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3fed82eee5314ec6282be309f63582b1a3ad0d334e048f973d7fe832ff3fe943.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
beeoann.hackcrack.io:32949
WMI Provider Host
-
reg_key
WMI Provider Host
-
splitter
|'|'|
Targets
-
-
Target
3fed82eee5314ec6282be309f63582b1a3ad0d334e048f973d7fe832ff3fe943.exe
-
Size
329KB
-
MD5
9d509cf97138b882335dd50f0a0c34d9
-
SHA1
3ad0963d838afe0a59d2bd42890b7ff033910cf6
-
SHA256
3fed82eee5314ec6282be309f63582b1a3ad0d334e048f973d7fe832ff3fe943
-
SHA512
67e83ea00bf2e291648fd4a017f566fde4592c19d6a09d67ee097c907aa6cfaa36085ea2dcdf6ef0ff6888453fc496a0c48298414cd07096a1b20e0eb66290d0
-
SSDEEP
6144:+AAeB34B2Dh19wMY8o/WNOKXOdFefVbYuRpANbhIDeP:+i3XwDON+oG0pD8
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1