General
-
Target
e1a32568a937eb3220d2c6af12e4133fac0cfd5c24cf36c75a09f98ee3fb415bN.exe
-
Size
8.7MB
-
Sample
240925-yfptxstgqp
-
MD5
c1a99d8e8044a4cacda971a3e49853e0
-
SHA1
4124830ea4b8b517e04c1015cb33d8d405a370b4
-
SHA256
e1a32568a937eb3220d2c6af12e4133fac0cfd5c24cf36c75a09f98ee3fb415b
-
SHA512
c1a1d93d8b6a36e57ba6b57250f7109cef68e628479ba1019a1508e0dbc09d455e67b03f7cf2b0a965850d4b79a1a5a37b95feb23fcd25867ee7c83203db8713
-
SSDEEP
196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbN:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmR
Static task
static1
Behavioral task
behavioral1
Sample
e1a32568a937eb3220d2c6af12e4133fac0cfd5c24cf36c75a09f98ee3fb415bN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e1a32568a937eb3220d2c6af12e4133fac0cfd5c24cf36c75a09f98ee3fb415bN.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
jjj
youri.mooo.com:1605
e936a10f968ac948cd351c9629dbd36d
-
reg_key
e936a10f968ac948cd351c9629dbd36d
-
splitter
|'|'|
Targets
-
-
Target
e1a32568a937eb3220d2c6af12e4133fac0cfd5c24cf36c75a09f98ee3fb415bN.exe
-
Size
8.7MB
-
MD5
c1a99d8e8044a4cacda971a3e49853e0
-
SHA1
4124830ea4b8b517e04c1015cb33d8d405a370b4
-
SHA256
e1a32568a937eb3220d2c6af12e4133fac0cfd5c24cf36c75a09f98ee3fb415b
-
SHA512
c1a1d93d8b6a36e57ba6b57250f7109cef68e628479ba1019a1508e0dbc09d455e67b03f7cf2b0a965850d4b79a1a5a37b95feb23fcd25867ee7c83203db8713
-
SSDEEP
196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbN:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmR
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1