General
-
Target
0dd42f9972f8ed7ee8c3baa8f683000272036d7c3e8122b075bcce3c5e1934a8N
-
Size
93KB
-
Sample
241007-g9hh9s1bqn
-
MD5
347136840cb1381fad7a452e0934cdc0
-
SHA1
88d5c5a8b98f69bd25bbfd4b5503f8a836ebd6a2
-
SHA256
0dd42f9972f8ed7ee8c3baa8f683000272036d7c3e8122b075bcce3c5e1934a8
-
SHA512
77755e12d2c5de54b6eac11373c73f8f7250126849fef8f2c55a0979f08231758ec072f4a832ba02ecf717340db12d56aa76f60d6f8b2d9b75269108cfb666d3
-
SSDEEP
768:qY3K5BnkpjTMpALPGMtsas88EtNXhe9f1mxCXxrjEtCdnl2pi1Rz4Rk39sGdpigM:Y5RkVbPGHz88EbW1pjEwzGi1dDtDigS
Behavioral task
behavioral1
Sample
0dd42f9972f8ed7ee8c3baa8f683000272036d7c3e8122b075bcce3c5e1934a8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0dd42f9972f8ed7ee8c3baa8f683000272036d7c3e8122b075bcce3c5e1934a8N.exe
Resource
win10v2004-20240910-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:8888
092f7f2e0326c4ab96afa5b2d81a0187
-
reg_key
092f7f2e0326c4ab96afa5b2d81a0187
-
splitter
|'|'|
Targets
-
-
Target
0dd42f9972f8ed7ee8c3baa8f683000272036d7c3e8122b075bcce3c5e1934a8N
-
Size
93KB
-
MD5
347136840cb1381fad7a452e0934cdc0
-
SHA1
88d5c5a8b98f69bd25bbfd4b5503f8a836ebd6a2
-
SHA256
0dd42f9972f8ed7ee8c3baa8f683000272036d7c3e8122b075bcce3c5e1934a8
-
SHA512
77755e12d2c5de54b6eac11373c73f8f7250126849fef8f2c55a0979f08231758ec072f4a832ba02ecf717340db12d56aa76f60d6f8b2d9b75269108cfb666d3
-
SSDEEP
768:qY3K5BnkpjTMpALPGMtsas88EtNXhe9f1mxCXxrjEtCdnl2pi1Rz4Rk39sGdpigM:Y5RkVbPGHz88EbW1pjEwzGi1dDtDigS
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1