General
-
Target
593c97cd396a1a87ed2f4648fca778dd4d2269d9f3239db66f8479470b66deca
-
Size
67KB
-
Sample
240830-yp6tsssekf
-
MD5
cd46566e6d0a3b5cf023610a1a0be29e
-
SHA1
d8fce87d7b9d7cfeb53c384326401af1233ff6ac
-
SHA256
593c97cd396a1a87ed2f4648fca778dd4d2269d9f3239db66f8479470b66deca
-
SHA512
3fbb9cf0f7619db23d72130bd48cc552233067b0d99a06a21b6773d6c3297dff3abbfacf247dd02f94b5d94daf2f2424e7a96bcd06cf22dfc1ff01b2a027f6be
-
SSDEEP
1536:6vyidBYAjNA29vw0RuGcCRCxW0xerAC2uy/Y1riJa01XsrPO9BCP34mTr:63BYAjSe/RufCRiW04t2HYWDoPiCPomf
Static task
static1
Behavioral task
behavioral1
Sample
f3708be0f01799bf40ab729a335e3b689049b6017f2671fbf92bf2579de24595.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f3708be0f01799bf40ab729a335e3b689049b6017f2671fbf92bf2579de24595.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.6.4
Neymar.Jr
Zapa.duckdns.org:7575
08e864d6f4c1fdf78ee0e9f6bdeb0bc1
-
reg_key
08e864d6f4c1fdf78ee0e9f6bdeb0bc1
-
splitter
|'|'|
Targets
-
-
Target
f3708be0f01799bf40ab729a335e3b689049b6017f2671fbf92bf2579de24595
-
Size
121KB
-
MD5
000f45f0e74708e3b79e7dd0598c5d9b
-
SHA1
23a1d58a40d4d2e90b47e5303eead4a9c65a79e8
-
SHA256
f3708be0f01799bf40ab729a335e3b689049b6017f2671fbf92bf2579de24595
-
SHA512
aade94af175ee2500134584f22cf1dd87d73b9fabeec2dbce9f44d72d587bdd0a66f56a5d3edd889e70d3dd4d5d6597847ad9fbd1a4a67d8b5c2fd703bc6178b
-
SSDEEP
3072:NPJQ1c9AXY7IQZyPPLs+dkPwDEJv1pp8hj:NGXYEXL1dkPWqppU
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1