General
-
Target
9142a4b18069acbfb8142459e243aa90N
-
Size
23KB
-
Sample
240908-z266rsxhqb
-
MD5
9142a4b18069acbfb8142459e243aa90
-
SHA1
0db7eca1598c384922b08a831862ea5f26cb0136
-
SHA256
8c29c88fd6172aac9b730f9b41dfab4dfc7e22b18b47b9c3a019353c2808849c
-
SHA512
5b3e648a65cd721c2d37bf078e3f338300651c6902e404516437c6d6910575c7e8528d3b8f41c75a27469b5a792b41b756874b1cbc76ec27f90cf1d18d25c117
-
SSDEEP
384:mslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZF+:veEvwIlLMRpcnu/
Behavioral task
behavioral1
Sample
9142a4b18069acbfb8142459e243aa90N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9142a4b18069acbfb8142459e243aa90N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
192.168.1.7:5552
b53d178639e7e2e0ed7bebb67224b0c0
-
reg_key
b53d178639e7e2e0ed7bebb67224b0c0
-
splitter
|'|'|
Targets
-
-
Target
9142a4b18069acbfb8142459e243aa90N
-
Size
23KB
-
MD5
9142a4b18069acbfb8142459e243aa90
-
SHA1
0db7eca1598c384922b08a831862ea5f26cb0136
-
SHA256
8c29c88fd6172aac9b730f9b41dfab4dfc7e22b18b47b9c3a019353c2808849c
-
SHA512
5b3e648a65cd721c2d37bf078e3f338300651c6902e404516437c6d6910575c7e8528d3b8f41c75a27469b5a792b41b756874b1cbc76ec27f90cf1d18d25c117
-
SSDEEP
384:mslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZF+:veEvwIlLMRpcnu/
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1