General
-
Target
27bf4c111c9278252bbe6a601df25d20N
-
Size
23KB
-
Sample
240909-s8njnsydja
-
MD5
27bf4c111c9278252bbe6a601df25d20
-
SHA1
3fcaf1ccc268897203806499aab83286162c26a3
-
SHA256
f8dec0f23808281a89b159c36c032fa81ef279fa64cc39c30ad4f3d253cb514a
-
SHA512
009c8eb45b49457171b8047fcae76916713718b8923689414be4f3287d780e36ec60dfdd04de7e23d1ba4aa64ad9ea06aa6ee7eb10974ad0a5e1d4b5d45074a8
-
SSDEEP
384:IslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZ6A:xeEvwIlLMRpcnug
Behavioral task
behavioral1
Sample
27bf4c111c9278252bbe6a601df25d20N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27bf4c111c9278252bbe6a601df25d20N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
10.10.10.10:5552
0dc24807523d3cd24b54cd0996e4c49b
-
reg_key
0dc24807523d3cd24b54cd0996e4c49b
-
splitter
|'|'|
Targets
-
-
Target
27bf4c111c9278252bbe6a601df25d20N
-
Size
23KB
-
MD5
27bf4c111c9278252bbe6a601df25d20
-
SHA1
3fcaf1ccc268897203806499aab83286162c26a3
-
SHA256
f8dec0f23808281a89b159c36c032fa81ef279fa64cc39c30ad4f3d253cb514a
-
SHA512
009c8eb45b49457171b8047fcae76916713718b8923689414be4f3287d780e36ec60dfdd04de7e23d1ba4aa64ad9ea06aa6ee7eb10974ad0a5e1d4b5d45074a8
-
SSDEEP
384:IslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZ6A:xeEvwIlLMRpcnug
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1