General
-
Target
464b61cfe1782dd93d35992994a69b6bf2b51c6adf31e2e9c2e9684dd29fddbe.exe
-
Size
3.3MB
-
Sample
241008-bx8l2awekc
-
MD5
b2adbe5ec5bba599a6de1525757d4305
-
SHA1
fda30246566cedc7cc7117169155ee3a1b69af7f
-
SHA256
464b61cfe1782dd93d35992994a69b6bf2b51c6adf31e2e9c2e9684dd29fddbe
-
SHA512
4e6b2d4bb094f4c500f00bda294a28800debb6573c2115b4eb61e2b6b4abca94854f448913dfbdc666fe6724c01cb237b9e5522a79054ddbc9d2c02da1dc0a88
-
SSDEEP
98304:MchV+2Z/m9D2D08Iw3QgT+l4NNEfUOq+O3XMifOYje:Xd/m9r8IstNEcOq+OM2OYje
Behavioral task
behavioral1
Sample
464b61cfe1782dd93d35992994a69b6bf2b51c6adf31e2e9c2e9684dd29fddbe.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
v4.0
HacKed
still-obviously.gl.at.ply.gg:46857
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
464b61cfe1782dd93d35992994a69b6bf2b51c6adf31e2e9c2e9684dd29fddbe.exe
-
Size
3.3MB
-
MD5
b2adbe5ec5bba599a6de1525757d4305
-
SHA1
fda30246566cedc7cc7117169155ee3a1b69af7f
-
SHA256
464b61cfe1782dd93d35992994a69b6bf2b51c6adf31e2e9c2e9684dd29fddbe
-
SHA512
4e6b2d4bb094f4c500f00bda294a28800debb6573c2115b4eb61e2b6b4abca94854f448913dfbdc666fe6724c01cb237b9e5522a79054ddbc9d2c02da1dc0a88
-
SSDEEP
98304:MchV+2Z/m9D2D08Iw3QgT+l4NNEfUOq+O3XMifOYje:Xd/m9r8IstNEcOq+OM2OYje
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Virtualization/Sandbox Evasion
1