General
-
Target
Server.exe
-
Size
93KB
-
Sample
240929-ye4xfs1eqa
-
MD5
fccac9bf6c83173de191751a3cc75688
-
SHA1
5a5f6db3aa85d921707822af7be0f749c00699f6
-
SHA256
c33fd04b22feb761253055d2674a112d6b527aa3f78e585d1f2d26df3e8512e7
-
SHA512
db453c4df92e6c274a6e558ed2a95ab4b22d17887dcebaf4760f9e7f2e0d6fc7e2cbe05f4e52690a54414bb466e39f85550535bede6e0979fe7e3499f19c487b
-
SSDEEP
1536:xkAY3SUFKnOr70txlZbgoGXejEwzGi1dDQDJgS:xkt7KnOr70txIXni1d+G
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:8080
c4aa78f645d876115299e9c20edace12
-
reg_key
c4aa78f645d876115299e9c20edace12
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
93KB
-
MD5
fccac9bf6c83173de191751a3cc75688
-
SHA1
5a5f6db3aa85d921707822af7be0f749c00699f6
-
SHA256
c33fd04b22feb761253055d2674a112d6b527aa3f78e585d1f2d26df3e8512e7
-
SHA512
db453c4df92e6c274a6e558ed2a95ab4b22d17887dcebaf4760f9e7f2e0d6fc7e2cbe05f4e52690a54414bb466e39f85550535bede6e0979fe7e3499f19c487b
-
SSDEEP
1536:xkAY3SUFKnOr70txlZbgoGXejEwzGi1dDQDJgS:xkt7KnOr70txIXni1d+G
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1