General
-
Target
4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2N
-
Size
543KB
-
Sample
240930-qmzzga1gmf
-
MD5
e0645a7fcb592dab2658f800888693a0
-
SHA1
123bedbc6e4af12908f4ef59fca1ad1af262ffb9
-
SHA256
4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2
-
SHA512
62b5c98141db209a8f4f7c88be22893c85c8d23d838d1f65dcd9d3284b19bba737e75ab5e1fc41aab813f7348799d6d4ec5f5a5f49b1153328f5c3bfc93bcca0
-
SSDEEP
12288:yVQIBRKed0Oa7JHveGg3bdd54VBwKEjA+8e5OXhOSJDVLlwHzz3k9Lac:yhBRKedW7JHveGg3bdv4VBwKEjJ8e5O/
Static task
static1
Behavioral task
behavioral1
Sample
4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2N.exe
Resource
win10v2004-20240910-en
Malware Config
Extracted
njrat
0.7d
HacKed
22.ip.gl.ply.gg:57731
32ce84f74d25f1e71aac67667a2c8d24
-
reg_key
32ce84f74d25f1e71aac67667a2c8d24
-
splitter
|'|'|
Targets
-
-
Target
4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2N
-
Size
543KB
-
MD5
e0645a7fcb592dab2658f800888693a0
-
SHA1
123bedbc6e4af12908f4ef59fca1ad1af262ffb9
-
SHA256
4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2
-
SHA512
62b5c98141db209a8f4f7c88be22893c85c8d23d838d1f65dcd9d3284b19bba737e75ab5e1fc41aab813f7348799d6d4ec5f5a5f49b1153328f5c3bfc93bcca0
-
SSDEEP
12288:yVQIBRKed0Oa7JHveGg3bdd54VBwKEjA+8e5OXhOSJDVLlwHzz3k9Lac:yhBRKedW7JHveGg3bdv4VBwKEjJ8e5O/
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2