General
-
Target
b5d03791152af32112680be74464a370d201c41e.bin
-
Size
23KB
-
Sample
240917-qfr1aavdpp
-
MD5
820f5a17e8cefe2eda0c7ed051c5060e
-
SHA1
b5d03791152af32112680be74464a370d201c41e
-
SHA256
ab42f9e59fc9aca2b23beaa1921a9b8fa5985234911ef51655cc3dda78a6345a
-
SHA512
d9f2a3fe2add82e2e20390c0e1ea9b0574aa0bbccdca435f492c91fe33be95f49c7799a8dc65796f582ad4857fbb54e176b9821b2b29e0a009fdae742c5a6951
-
SSDEEP
384:CoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI+:F7O89p2rRpcnuM
Behavioral task
behavioral1
Sample
b5d03791152af32112680be74464a370d201c41e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b5d03791152af32112680be74464a370d201c41e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
10.10.1.11:5552
7657c14284185fbd3fb108b43c7467ba
-
reg_key
7657c14284185fbd3fb108b43c7467ba
-
splitter
|'|'|
Targets
-
-
Target
b5d03791152af32112680be74464a370d201c41e.bin
-
Size
23KB
-
MD5
820f5a17e8cefe2eda0c7ed051c5060e
-
SHA1
b5d03791152af32112680be74464a370d201c41e
-
SHA256
ab42f9e59fc9aca2b23beaa1921a9b8fa5985234911ef51655cc3dda78a6345a
-
SHA512
d9f2a3fe2add82e2e20390c0e1ea9b0574aa0bbccdca435f492c91fe33be95f49c7799a8dc65796f582ad4857fbb54e176b9821b2b29e0a009fdae742c5a6951
-
SSDEEP
384:CoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI+:F7O89p2rRpcnuM
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1