General
-
Target
njRAT-RED-V12.exe
-
Size
27KB
-
Sample
241001-vd9vjazflp
-
MD5
6bafe0541bffb68e63ef17c551258ac6
-
SHA1
804366c8260b1fd73ed84e4a5a65c159aa8def05
-
SHA256
0a2b53b63e489324c13eb75d7543a4e10755ae341522e1e795230c1eeffe8bff
-
SHA512
9d3ef0651f79b590aa8a334daf4bcbba079052b7c38717b3bf0b5e67ebecee91757039d08697c86b197f2518314e5bd2f1a459b8b9c7e12cd3a11b0e08836409
-
SSDEEP
384:ILZxZ3ZfjHnGgk8QgLLwv6mxEP9AOWIMNAQk93vmhm7UMKmIEecKdbXTzm9bVhcF:2931jHGqghNA/vMHTi9bD
Behavioral task
behavioral1
Sample
njRAT-RED-V12.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
njRAT-RED-V12.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
v2.0
Windows
language-sublime.gl.at.ply.gg:59424
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
njRAT-RED-V12.exe
-
Size
27KB
-
MD5
6bafe0541bffb68e63ef17c551258ac6
-
SHA1
804366c8260b1fd73ed84e4a5a65c159aa8def05
-
SHA256
0a2b53b63e489324c13eb75d7543a4e10755ae341522e1e795230c1eeffe8bff
-
SHA512
9d3ef0651f79b590aa8a334daf4bcbba079052b7c38717b3bf0b5e67ebecee91757039d08697c86b197f2518314e5bd2f1a459b8b9c7e12cd3a11b0e08836409
-
SSDEEP
384:ILZxZ3ZfjHnGgk8QgLLwv6mxEP9AOWIMNAQk93vmhm7UMKmIEecKdbXTzm9bVhcF:2931jHGqghNA/vMHTi9bD
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1