General
-
Target
3c44cbb99cc237c087e10c63fae5a7e8bb26c602241b0be79e9f984cdaba9781N
-
Size
43KB
-
Sample
241018-rpjwpstfjl
-
MD5
7b5539d4e33d06c87cc73b529af14380
-
SHA1
d453ed2e3d34baf021af815ef512d990cc68d1a9
-
SHA256
3c44cbb99cc237c087e10c63fae5a7e8bb26c602241b0be79e9f984cdaba9781
-
SHA512
9e3a35be37590b323f3d1deb9921b8ec917986c396f89bdccc66fa2288a927544ca15c1ead5115f361f5d6fcf3bf10fda6f17824fd3cd89b4cfafe462221c673
-
SSDEEP
384:76ZyA4D4olYxOoyi0I7wycuEN88FQPzgIij+ZsNO3PlpJKkkjh/TzF7pWni/greT:8fouIli0gwjL8awuXQ/on/+L+
Behavioral task
behavioral1
Sample
3c44cbb99cc237c087e10c63fae5a7e8bb26c602241b0be79e9f984cdaba9781N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3c44cbb99cc237c087e10c63fae5a7e8bb26c602241b0be79e9f984cdaba9781N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
127.0.0.1:5555
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
3c44cbb99cc237c087e10c63fae5a7e8bb26c602241b0be79e9f984cdaba9781N
-
Size
43KB
-
MD5
7b5539d4e33d06c87cc73b529af14380
-
SHA1
d453ed2e3d34baf021af815ef512d990cc68d1a9
-
SHA256
3c44cbb99cc237c087e10c63fae5a7e8bb26c602241b0be79e9f984cdaba9781
-
SHA512
9e3a35be37590b323f3d1deb9921b8ec917986c396f89bdccc66fa2288a927544ca15c1ead5115f361f5d6fcf3bf10fda6f17824fd3cd89b4cfafe462221c673
-
SSDEEP
384:76ZyA4D4olYxOoyi0I7wycuEN88FQPzgIij+ZsNO3PlpJKkkjh/TzF7pWni/greT:8fouIli0gwjL8awuXQ/on/+L+
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1