General
-
Target
9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a
-
Size
93KB
-
Sample
240930-a5dk7ayenr
-
MD5
49130501c3e3ced98b19c89406ea8afa
-
SHA1
57fd8ae8455d6d6af27ee88a51e32ace8d7ef588
-
SHA256
9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a
-
SHA512
ead3d077eb9f79a32de75531570bbce895852058c20c0deb440e3c832e3407249088e6218094b9789ee69ca707482e5be729ccdc00c2d3f8e709324adfa5080b
-
SSDEEP
768:IY3/upD9O/pBcxYsbae6GIXb9pDX2b9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3jsGa:PuLOx6baIa9RIj00ljEwzGi1dDvDEgS
Behavioral task
behavioral1
Sample
9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:5552
36dd2bffd730e382987c13909f3cc4a3
-
reg_key
36dd2bffd730e382987c13909f3cc4a3
-
splitter
|'|'|
Targets
-
-
Target
9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a
-
Size
93KB
-
MD5
49130501c3e3ced98b19c89406ea8afa
-
SHA1
57fd8ae8455d6d6af27ee88a51e32ace8d7ef588
-
SHA256
9fde827532b71dbb6e3263a50c4d7005ed7cb34b13ab0285186f8131e8d17e7a
-
SHA512
ead3d077eb9f79a32de75531570bbce895852058c20c0deb440e3c832e3407249088e6218094b9789ee69ca707482e5be729ccdc00c2d3f8e709324adfa5080b
-
SSDEEP
768:IY3/upD9O/pBcxYsbae6GIXb9pDX2b9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3jsGa:PuLOx6baIa9RIj00ljEwzGi1dDvDEgS
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1