General
-
Target
a4185c129f1180fbcc31930f88c115e0N.exe
-
Size
84KB
-
Sample
240830-tj34hasfmb
-
MD5
a4185c129f1180fbcc31930f88c115e0
-
SHA1
241c572d34c0b8605ab9a0899fa0c0f6617215f5
-
SHA256
eda4271057ea7e794385758d7dc8b9caa84dddb33aa4736c6bab6b4e26989c35
-
SHA512
fc04ddccafacaa374f6ed7b77e38a07cc460f5e61416995a94ba4a42d2c5b67e8dfae2edf7e39ec454b14759a13d8e7ed29755ce932a954e5adb7a384a7479a4
-
SSDEEP
1536:CQ6/VKyx0RWmusniDoo6dM/67j93zrAGyNkG:X6TuUm2jR67j93zrAGyNkG
Static task
static1
Behavioral task
behavioral1
Sample
a4185c129f1180fbcc31930f88c115e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4185c129f1180fbcc31930f88c115e0N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
Anakim
127.0.0.1:5552
66b5284271358c0b2cfc6afda2eab063
-
reg_key
66b5284271358c0b2cfc6afda2eab063
-
splitter
|'|'|
Targets
-
-
Target
a4185c129f1180fbcc31930f88c115e0N.exe
-
Size
84KB
-
MD5
a4185c129f1180fbcc31930f88c115e0
-
SHA1
241c572d34c0b8605ab9a0899fa0c0f6617215f5
-
SHA256
eda4271057ea7e794385758d7dc8b9caa84dddb33aa4736c6bab6b4e26989c35
-
SHA512
fc04ddccafacaa374f6ed7b77e38a07cc460f5e61416995a94ba4a42d2c5b67e8dfae2edf7e39ec454b14759a13d8e7ed29755ce932a954e5adb7a384a7479a4
-
SSDEEP
1536:CQ6/VKyx0RWmusniDoo6dM/67j93zrAGyNkG:X6TuUm2jR67j93zrAGyNkG
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1