General
-
Target
b67bac97cb1ab1f7487b9b90a22de39cfac5c5e39f569e0e761ff40476ae0dd6N
-
Size
71KB
-
Sample
240930-a2p5taydkp
-
MD5
a3e86a6a1a141f274851a3502037b980
-
SHA1
741c4ea32737cee7eb8e17580be198287065e693
-
SHA256
b67bac97cb1ab1f7487b9b90a22de39cfac5c5e39f569e0e761ff40476ae0dd6
-
SHA512
e60f2f13c555145e75505cacfef9edc6baf7bac37499ff4ccda52467c09fbed55a83c78b5152eb91abd6cc0ef3dd41c0fbb4f991fca87443460f43fc767d7ed6
-
SSDEEP
1536:6Uvs42tjhOUFWCsiSWS2RXEoZzD3lS3sKn61z1Fb9b:6U0DjkLfaR5hg3sdrt
Static task
static1
Behavioral task
behavioral1
Sample
b67bac97cb1ab1f7487b9b90a22de39cfac5c5e39f569e0e761ff40476ae0dd6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b67bac97cb1ab1f7487b9b90a22de39cfac5c5e39f569e0e761ff40476ae0dd6N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
279f6960ed84a752570aca7fb2dc1552
-
reg_key
279f6960ed84a752570aca7fb2dc1552
-
splitter
|'|'|
Targets
-
-
Target
b67bac97cb1ab1f7487b9b90a22de39cfac5c5e39f569e0e761ff40476ae0dd6N
-
Size
71KB
-
MD5
a3e86a6a1a141f274851a3502037b980
-
SHA1
741c4ea32737cee7eb8e17580be198287065e693
-
SHA256
b67bac97cb1ab1f7487b9b90a22de39cfac5c5e39f569e0e761ff40476ae0dd6
-
SHA512
e60f2f13c555145e75505cacfef9edc6baf7bac37499ff4ccda52467c09fbed55a83c78b5152eb91abd6cc0ef3dd41c0fbb4f991fca87443460f43fc767d7ed6
-
SSDEEP
1536:6Uvs42tjhOUFWCsiSWS2RXEoZzD3lS3sKn61z1Fb9b:6U0DjkLfaR5hg3sdrt
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1