General
-
Target
1ab5a32c95f4645f124b455ccbd65a46e56897a9f0f62e3edd8a8c3ea06189ab.exe
-
Size
29KB
-
Sample
240928-l97wdasflb
-
MD5
ac93ce6935848930ac86704f468157ab
-
SHA1
7c34db340470b0452aaa6c9b50cda9f6947fc375
-
SHA256
1ab5a32c95f4645f124b455ccbd65a46e56897a9f0f62e3edd8a8c3ea06189ab
-
SHA512
8229aca448803069dd076325a3eebeda4cd579f06376aa6f50d51af7f3ccbbfddbb40df6318f92a199b9f76f562f9905fcfe8b0e997beacd27cce1773d7beb87
-
SSDEEP
384:T4SWjNl7XNRoWGVulRVJ5zaImGmqDcI6ewdGBsbh0w4wlAokw9OhgOL1vYRGOZzp:TK7ToWGVKhcI4qN6exBKh0p29SgR6u
Behavioral task
behavioral1
Sample
1ab5a32c95f4645f124b455ccbd65a46e56897a9f0f62e3edd8a8c3ea06189ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ab5a32c95f4645f124b455ccbd65a46e56897a9f0f62e3edd8a8c3ea06189ab.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.6.4
HacKed
192.168.1.2:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Targets
-
-
Target
1ab5a32c95f4645f124b455ccbd65a46e56897a9f0f62e3edd8a8c3ea06189ab.exe
-
Size
29KB
-
MD5
ac93ce6935848930ac86704f468157ab
-
SHA1
7c34db340470b0452aaa6c9b50cda9f6947fc375
-
SHA256
1ab5a32c95f4645f124b455ccbd65a46e56897a9f0f62e3edd8a8c3ea06189ab
-
SHA512
8229aca448803069dd076325a3eebeda4cd579f06376aa6f50d51af7f3ccbbfddbb40df6318f92a199b9f76f562f9905fcfe8b0e997beacd27cce1773d7beb87
-
SSDEEP
384:T4SWjNl7XNRoWGVulRVJ5zaImGmqDcI6ewdGBsbh0w4wlAokw9OhgOL1vYRGOZzp:TK7ToWGVKhcI4qN6exBKh0p29SgR6u
-
Modifies Windows Firewall
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1