General
-
Target
0430ca347a7297985ec52effaec4c8298be3f8e71b6b71ae9b9f9db011fe6930N
-
Size
93KB
-
Sample
240923-nv4xaayhjd
-
MD5
707dd3cd93671381aec9b5c1473a5260
-
SHA1
bbbc9bb46896a6f0e60f3b058c654e5f9a148e51
-
SHA256
0430ca347a7297985ec52effaec4c8298be3f8e71b6b71ae9b9f9db011fe6930
-
SHA512
3bd21646dad4a17615a2c01cd17194cffb3ad45262b4a4875a058509cd137903da13a41db4a24cde5c2e25795a71cac9cb0380f3ad9ade1ff38a27bee058ef59
-
SSDEEP
1536:/GK1GkeUqZJO53NSimjEwzGi1dDu2DLgS:/G1UqZJOpAOi1dPE
Behavioral task
behavioral1
Sample
0430ca347a7297985ec52effaec4c8298be3f8e71b6b71ae9b9f9db011fe6930N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0430ca347a7297985ec52effaec4c8298be3f8e71b6b71ae9b9f9db011fe6930N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
White Admin
hakim32.ddns.net:2000
127.0.0.1:1111
e3aa2f7297b5d7027e5e530d5c5041ed
-
reg_key
e3aa2f7297b5d7027e5e530d5c5041ed
-
splitter
|'|'|
Targets
-
-
Target
0430ca347a7297985ec52effaec4c8298be3f8e71b6b71ae9b9f9db011fe6930N
-
Size
93KB
-
MD5
707dd3cd93671381aec9b5c1473a5260
-
SHA1
bbbc9bb46896a6f0e60f3b058c654e5f9a148e51
-
SHA256
0430ca347a7297985ec52effaec4c8298be3f8e71b6b71ae9b9f9db011fe6930
-
SHA512
3bd21646dad4a17615a2c01cd17194cffb3ad45262b4a4875a058509cd137903da13a41db4a24cde5c2e25795a71cac9cb0380f3ad9ade1ff38a27bee058ef59
-
SSDEEP
1536:/GK1GkeUqZJO53NSimjEwzGi1dDu2DLgS:/G1UqZJOpAOi1dPE
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1