General
-
Target
455193e153b09c0c36a9f14f7c1db75e21231615f992c413281b1135dd5b8334.exe
-
Size
27KB
-
Sample
241011-bsdabsxgqb
-
MD5
65abbb1b8cb5f121249ad00bf99995aa
-
SHA1
e2716aa2af91bfa1e44e029fc86776690d3d2c74
-
SHA256
455193e153b09c0c36a9f14f7c1db75e21231615f992c413281b1135dd5b8334
-
SHA512
bef09a4254b4c0087487d2d28172ecfd133e05508f665545cc2c94b7349cd254edd22e3b37eeeb01f9aeac6dfb4caf024bfa9b52abfe67d42ae3923ac3ae295c
-
SSDEEP
384:CLpHqxzDGoEXHWtyXc0gCQP8thFMRAQk93vmhm7UMKmIEecKdbXTzm9bVhcar6D1:cpKFy4pFRA/vMHTi9bD
Behavioral task
behavioral1
Sample
455193e153b09c0c36a9f14f7c1db75e21231615f992c413281b1135dd5b8334.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
455193e153b09c0c36a9f14f7c1db75e21231615f992c413281b1135dd5b8334.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v2.0
HacKed
193.161.193.99:41878
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
455193e153b09c0c36a9f14f7c1db75e21231615f992c413281b1135dd5b8334.exe
-
Size
27KB
-
MD5
65abbb1b8cb5f121249ad00bf99995aa
-
SHA1
e2716aa2af91bfa1e44e029fc86776690d3d2c74
-
SHA256
455193e153b09c0c36a9f14f7c1db75e21231615f992c413281b1135dd5b8334
-
SHA512
bef09a4254b4c0087487d2d28172ecfd133e05508f665545cc2c94b7349cd254edd22e3b37eeeb01f9aeac6dfb4caf024bfa9b52abfe67d42ae3923ac3ae295c
-
SSDEEP
384:CLpHqxzDGoEXHWtyXc0gCQP8thFMRAQk93vmhm7UMKmIEecKdbXTzm9bVhcar6D1:cpKFy4pFRA/vMHTi9bD
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1