General
-
Target
fa751a76c642d964037f4bd88db04e30N.exe
-
Size
172KB
-
Sample
240830-mm9bcs1cpq
-
MD5
fa751a76c642d964037f4bd88db04e30
-
SHA1
02c7346af3816c4f61a4a47c016bdfd0c88afedd
-
SHA256
36e5ac444af1ddf8dfa1f67132ec053430ef93c2212a1b6463bc165bd2d00b49
-
SHA512
6680b1e37d872755ef2e584724047f3e7d7857f460d61eb7484f5490e24c58453782bbc0782c14f3f34940efe5cdc6ed5c350596ced1e0ed3611114c920f3fdf
-
SSDEEP
3072:QxnTTbBgKZvq08p1MS1BllY7aYtLH9NHTuVIT2U2y:uNZ8p17y7d9JTQIT2U2
Static task
static1
Behavioral task
behavioral1
Sample
fa751a76c642d964037f4bd88db04e30N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fa751a76c642d964037f4bd88db04e30N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
bytet.ddns.net:5552
3fb8a2ca84b8925e17882e2cb765f819
-
reg_key
3fb8a2ca84b8925e17882e2cb765f819
-
splitter
|'|'|
Targets
-
-
Target
fa751a76c642d964037f4bd88db04e30N.exe
-
Size
172KB
-
MD5
fa751a76c642d964037f4bd88db04e30
-
SHA1
02c7346af3816c4f61a4a47c016bdfd0c88afedd
-
SHA256
36e5ac444af1ddf8dfa1f67132ec053430ef93c2212a1b6463bc165bd2d00b49
-
SHA512
6680b1e37d872755ef2e584724047f3e7d7857f460d61eb7484f5490e24c58453782bbc0782c14f3f34940efe5cdc6ed5c350596ced1e0ed3611114c920f3fdf
-
SSDEEP
3072:QxnTTbBgKZvq08p1MS1BllY7aYtLH9NHTuVIT2U2y:uNZ8p17y7d9JTQIT2U2
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1