General
-
Target
3c6ae580c9a8c901402006e2cc4c18e0N.exe
-
Size
114KB
-
Sample
240813-sjk29azhqf
-
MD5
3c6ae580c9a8c901402006e2cc4c18e0
-
SHA1
cec8a398145da2dd940b72a49eea67406a762224
-
SHA256
a58c8621d5502657c2ccd4501f83b4dcd122a92156e9134d18eb0b113c716da4
-
SHA512
309db7b5f8d5adcabbd77a6c53ca7099c44d0155802af7250e25aa3639cf821402011325ae10e8521bcf041857382b0df14553a4c3cbf3e6ac1f8c9a976f735c
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMJ:P5eznsjsguGDFqGZ2rJ
Static task
static1
Behavioral task
behavioral1
Sample
3c6ae580c9a8c901402006e2cc4c18e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c6ae580c9a8c901402006e2cc4c18e0N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
3c6ae580c9a8c901402006e2cc4c18e0N.exe
-
Size
114KB
-
MD5
3c6ae580c9a8c901402006e2cc4c18e0
-
SHA1
cec8a398145da2dd940b72a49eea67406a762224
-
SHA256
a58c8621d5502657c2ccd4501f83b4dcd122a92156e9134d18eb0b113c716da4
-
SHA512
309db7b5f8d5adcabbd77a6c53ca7099c44d0155802af7250e25aa3639cf821402011325ae10e8521bcf041857382b0df14553a4c3cbf3e6ac1f8c9a976f735c
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMJ:P5eznsjsguGDFqGZ2rJ
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1