General
-
Target
77996df6c3c65280dce2b3dab44cf335c9f4e42a57b56f6100e9d568268949e7.exe
-
Size
43KB
-
Sample
240823-cphlbasepk
-
MD5
c31546e94ffa97015dc91c1ba7e987f7
-
SHA1
9a03b3a4a6d6f12fc0e5f66fe4d52ab307a689ba
-
SHA256
77996df6c3c65280dce2b3dab44cf335c9f4e42a57b56f6100e9d568268949e7
-
SHA512
6de0600e8b751a54c45d0e6eb7cd07634a036bc4b513d8156f024e042f16d121ec2c0d69e025e04daa34d452ccaca6d58acaaa9f570f580bcf21749385342214
-
SSDEEP
384:rZyJ+FgpWoy7A3V14YiElIHAknzYIij+ZsNO3PlpJKkkjh/TzF7pWnk/greT0pqD:FfWol78V1BEgMuXQ/oZ/+L
Behavioral task
behavioral1
Sample
77996df6c3c65280dce2b3dab44cf335c9f4e42a57b56f6100e9d568268949e7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
77996df6c3c65280dce2b3dab44cf335c9f4e42a57b56f6100e9d568268949e7.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
127.0.0.1:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
77996df6c3c65280dce2b3dab44cf335c9f4e42a57b56f6100e9d568268949e7.exe
-
Size
43KB
-
MD5
c31546e94ffa97015dc91c1ba7e987f7
-
SHA1
9a03b3a4a6d6f12fc0e5f66fe4d52ab307a689ba
-
SHA256
77996df6c3c65280dce2b3dab44cf335c9f4e42a57b56f6100e9d568268949e7
-
SHA512
6de0600e8b751a54c45d0e6eb7cd07634a036bc4b513d8156f024e042f16d121ec2c0d69e025e04daa34d452ccaca6d58acaaa9f570f580bcf21749385342214
-
SSDEEP
384:rZyJ+FgpWoy7A3V14YiElIHAknzYIij+ZsNO3PlpJKkkjh/TzF7pWnk/greT0pqD:FfWol78V1BEgMuXQ/oZ/+L
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1