General
-
Target
e4845dcb52a3c7f7a8d483d73ff03510N.exe
-
Size
23KB
-
Sample
240902-clfybayejp
-
MD5
e4845dcb52a3c7f7a8d483d73ff03510
-
SHA1
0aa86ab7e571598dc2498ab1136ade10788b05c1
-
SHA256
dcabd39d5ccdeb0d94dc2072903f270aa5d68dacc3d4149a9d8e6b90e8396e55
-
SHA512
2737fe0cc58357bcf408ea3de1b54286a46d56666114a30772e574d2711090495d7f29fc6e3587d4102328a6d73cb68fd20c4667e5f06708f5f9fca282cdb9d2
-
SSDEEP
384:TPoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZKW:To7O89p2rRpcnu6
Behavioral task
behavioral1
Sample
e4845dcb52a3c7f7a8d483d73ff03510N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e4845dcb52a3c7f7a8d483d73ff03510N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
71d4a517242481fcbbd31dd50ae04a6b
-
reg_key
71d4a517242481fcbbd31dd50ae04a6b
-
splitter
|'|'|
Targets
-
-
Target
e4845dcb52a3c7f7a8d483d73ff03510N.exe
-
Size
23KB
-
MD5
e4845dcb52a3c7f7a8d483d73ff03510
-
SHA1
0aa86ab7e571598dc2498ab1136ade10788b05c1
-
SHA256
dcabd39d5ccdeb0d94dc2072903f270aa5d68dacc3d4149a9d8e6b90e8396e55
-
SHA512
2737fe0cc58357bcf408ea3de1b54286a46d56666114a30772e574d2711090495d7f29fc6e3587d4102328a6d73cb68fd20c4667e5f06708f5f9fca282cdb9d2
-
SSDEEP
384:TPoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZKW:To7O89p2rRpcnu6
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1