General
-
Target
d31468f4f668dcfc7630378ea31a4b2a724f924a7da87fa07738da8308aee2e2N
-
Size
2.5MB
-
Sample
241007-mx2z2a1emq
-
MD5
2ca9585c7d3554321723cfab60ade3c0
-
SHA1
62b0a7357607fb7266fb69db4525868cebad74ce
-
SHA256
d31468f4f668dcfc7630378ea31a4b2a724f924a7da87fa07738da8308aee2e2
-
SHA512
1e069595a79b6305c5656c3ce5ae856ca9f22ebce86dc5bb411d9ced1fc5c5b36c9f170d2133e4e43adfbe469a6f5d3687767aeb28af22faba430f93bc5bc4d9
-
SSDEEP
49152:C8botmhl9Dd/byTKv0hwxetvSWNv/cL85m:P
Static task
static1
Behavioral task
behavioral1
Sample
d31468f4f668dcfc7630378ea31a4b2a724f924a7da87fa07738da8308aee2e2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d31468f4f668dcfc7630378ea31a4b2a724f924a7da87fa07738da8308aee2e2N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
user
windowssistem.duckdns.org:5020
cff070eafb77e420cce40ff9e3f8a491
-
reg_key
cff070eafb77e420cce40ff9e3f8a491
-
splitter
|'|'|
Targets
-
-
Target
d31468f4f668dcfc7630378ea31a4b2a724f924a7da87fa07738da8308aee2e2N
-
Size
2.5MB
-
MD5
2ca9585c7d3554321723cfab60ade3c0
-
SHA1
62b0a7357607fb7266fb69db4525868cebad74ce
-
SHA256
d31468f4f668dcfc7630378ea31a4b2a724f924a7da87fa07738da8308aee2e2
-
SHA512
1e069595a79b6305c5656c3ce5ae856ca9f22ebce86dc5bb411d9ced1fc5c5b36c9f170d2133e4e43adfbe469a6f5d3687767aeb28af22faba430f93bc5bc4d9
-
SSDEEP
49152:C8botmhl9Dd/byTKv0hwxetvSWNv/cL85m:P
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1