General
-
Target
6e3f2ebb560fede5fca72650a4f495d1038930a3a7c0bebbd032be0a79e1f2b2.exe
-
Size
22KB
-
Sample
240928-j3m7aavhkn
-
MD5
14cf4f2623f9c31a8ad03945e848a60c
-
SHA1
677c414db6441270a8ed824a8a27259ff2720758
-
SHA256
6e3f2ebb560fede5fca72650a4f495d1038930a3a7c0bebbd032be0a79e1f2b2
-
SHA512
e43c6095290b28e22a655c2c223811d8b46fc75428db5c52a3f896e52ef795ce2267a6c92dfad753aef6cb47740de721ba41713b7533fd59c9a7b29f0aeb3c83
-
SSDEEP
384:2+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZRv:pm+71d5XRpcnui
Behavioral task
behavioral1
Sample
6e3f2ebb560fede5fca72650a4f495d1038930a3a7c0bebbd032be0a79e1f2b2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6e3f2ebb560fede5fca72650a4f495d1038930a3a7c0bebbd032be0a79e1f2b2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
shytanoff.ddns.net:1177
3d0dd0f92b252ee0856a5ed12374a126
-
reg_key
3d0dd0f92b252ee0856a5ed12374a126
-
splitter
|'|'|
Targets
-
-
Target
6e3f2ebb560fede5fca72650a4f495d1038930a3a7c0bebbd032be0a79e1f2b2.exe
-
Size
22KB
-
MD5
14cf4f2623f9c31a8ad03945e848a60c
-
SHA1
677c414db6441270a8ed824a8a27259ff2720758
-
SHA256
6e3f2ebb560fede5fca72650a4f495d1038930a3a7c0bebbd032be0a79e1f2b2
-
SHA512
e43c6095290b28e22a655c2c223811d8b46fc75428db5c52a3f896e52ef795ce2267a6c92dfad753aef6cb47740de721ba41713b7533fd59c9a7b29f0aeb3c83
-
SSDEEP
384:2+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZRv:pm+71d5XRpcnui
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1