General
-
Target
96bf799fbafcbc9e851fe8d3b10b292c4eabe9bfc9d208e99974b1b55d335c63.exe
-
Size
22KB
-
Sample
240927-ymyqeawgql
-
MD5
ed4ce0f471e4e08f00df8b0ba0e2ff9d
-
SHA1
fe48b3a5185edccca8203f626292a944fa614358
-
SHA256
96bf799fbafcbc9e851fe8d3b10b292c4eabe9bfc9d208e99974b1b55d335c63
-
SHA512
c76c1b2da103b0cea271a778600ab9da6d9abfe11b7e7f46beadb6e2ab6a3e612a8fbfe2f389b0d75f0e59bd9d5437a55b28a98bc0bc4e4df1a7822fba5a2d37
-
SSDEEP
384:uMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZv/:Zb9glF51LRpcnuE
Behavioral task
behavioral1
Sample
96bf799fbafcbc9e851fe8d3b10b292c4eabe9bfc9d208e99974b1b55d335c63.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96bf799fbafcbc9e851fe8d3b10b292c4eabe9bfc9d208e99974b1b55d335c63.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
shytangz12.ddns.net:1177
65271d5e85054f67d5a5285b8baa1fd0
-
reg_key
65271d5e85054f67d5a5285b8baa1fd0
-
splitter
|'|'|
Targets
-
-
Target
96bf799fbafcbc9e851fe8d3b10b292c4eabe9bfc9d208e99974b1b55d335c63.exe
-
Size
22KB
-
MD5
ed4ce0f471e4e08f00df8b0ba0e2ff9d
-
SHA1
fe48b3a5185edccca8203f626292a944fa614358
-
SHA256
96bf799fbafcbc9e851fe8d3b10b292c4eabe9bfc9d208e99974b1b55d335c63
-
SHA512
c76c1b2da103b0cea271a778600ab9da6d9abfe11b7e7f46beadb6e2ab6a3e612a8fbfe2f389b0d75f0e59bd9d5437a55b28a98bc0bc4e4df1a7822fba5a2d37
-
SSDEEP
384:uMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZv/:Zb9glF51LRpcnuE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1