General
-
Target
d88d9478a3df86f3aad088f1d93e25f31eb9ad74a01f087b1a4a9533daf25fa6.exe
-
Size
35KB
-
Sample
240902-k326wawhrq
-
MD5
fb7f625eaf12d695aef5428a1433b0c8
-
SHA1
ed62ab0f392fba85c32977f96ff5cd01092e2898
-
SHA256
200d11cd8fe4e8f7a6f67d79c2c3c74fca63712c421ac999e49221232f355e88
-
SHA512
f379aaf1fcf1dff44436386b5f3dd198664caa98675dfcc3187bf2b255763a56de4a6a85486b464de6ea2a616479b0cf0ee86319b1a060432976dcaaf16570f5
-
SSDEEP
768:N7kprWOT9k3Cd4AJ/xssHJTVrj/okBDXZ6SmplA7PS+bHrT4Q:N+iOT9kSd5rpJTVrjA0V6hlkS+MQ
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/Users/Usuario/Downloads/d88d9478a3df86f3aad088f1d93e25f31eb9ad74a01f087b1a4a9533daf25fa6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/Users/Usuario/Downloads/d88d9478a3df86f3aad088f1d93e25f31eb9ad74a01f087b1a4a9533daf25fa6.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
Server
hakim32.ddns.net:2000
0.tcp.jp.ngrok.io:12215
cae159ad290a06b8a442e247969718ad
-
reg_key
cae159ad290a06b8a442e247969718ad
-
splitter
|'|'|
Targets
-
-
Target
Device/HarddiskVolume3/Users/Usuario/Downloads/d88d9478a3df86f3aad088f1d93e25f31eb9ad74a01f087b1a4a9533daf25fa6.exe
-
Size
93KB
-
MD5
333edb223d980aa62d38eccece026ce4
-
SHA1
96dcf76040ef3db4e5fd04f6e5f572a20abb6404
-
SHA256
d88d9478a3df86f3aad088f1d93e25f31eb9ad74a01f087b1a4a9533daf25fa6
-
SHA512
8489721a0cd9b1bda528b460d62e79b5b79484a8b34760915c7d9d8b3d2951e30f8d9bef2ee6061be4a729e73982161175e6eace72e1a07e3494f9f1be33aa6d
-
SSDEEP
768:xY3B+xFKghFchQVTqWnwz/1h3XE/blTzxXSsvXxrjEtCdnl2pi1Rz4Rk3OsGdpyD:u+nK6bTq8itNEhVhjEwzGi1dDKDyzgS
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1