General
-
Target
Server.exe
-
Size
93KB
-
Sample
241025-p6v9yszckf
-
MD5
84cc7227d21f9c65cae6e4451f18483d
-
SHA1
504dff55fb25343ec964f740ecaba9d7d490fde3
-
SHA256
4a41991bfc4cdd9dcec82592963bb61f62eb3075a53273bb018dc650eec49350
-
SHA512
db834a4009a979c17f6759597fe0f86bcccb4c726c7f7c2518d57de1ca6ee95199e6dd2a96737cb93c64b3304ae5f39318b7d0349a9c74b6606934f22adfec65
-
SSDEEP
768:uY32ub30YTXspgM0m2zGjpyDtdXWuhtXfLWhyXxrjEtCdnl2pi1Rz4Rk3ysGdpW3:YuT0AA0mT1mrWGL5jEwzGi1dDuDWgS
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:1488
194d07662fe5562b24844f1d19460971
-
reg_key
194d07662fe5562b24844f1d19460971
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
93KB
-
MD5
84cc7227d21f9c65cae6e4451f18483d
-
SHA1
504dff55fb25343ec964f740ecaba9d7d490fde3
-
SHA256
4a41991bfc4cdd9dcec82592963bb61f62eb3075a53273bb018dc650eec49350
-
SHA512
db834a4009a979c17f6759597fe0f86bcccb4c726c7f7c2518d57de1ca6ee95199e6dd2a96737cb93c64b3304ae5f39318b7d0349a9c74b6606934f22adfec65
-
SSDEEP
768:uY32ub30YTXspgM0m2zGjpyDtdXWuhtXfLWhyXxrjEtCdnl2pi1Rz4Rk3ysGdpW3:YuT0AA0mT1mrWGL5jEwzGi1dDuDWgS
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1