General
-
Target
81c14b87edf38378b76af207724449cf77f14d71004a3848c0f859749baa2359N
-
Size
113KB
-
Sample
241025-qz3acs1fpn
-
MD5
e861ff7cad7d40a53443e92985ae5cc0
-
SHA1
76024e8e8e87eb879f5daa79be2e1512c9e30769
-
SHA256
81c14b87edf38378b76af207724449cf77f14d71004a3848c0f859749baa2359
-
SHA512
e15b361cb916a80416249dc2c21696d58223615cd73521988d2d0be1cc232194c21209f83a84d82762d429462b2545057babd070d9c580f87fadc49ea0fe8b22
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RQ:w5eznsjsguGDFqGx8egoxmO3rRQ
Static task
static1
Behavioral task
behavioral1
Sample
81c14b87edf38378b76af207724449cf77f14d71004a3848c0f859749baa2359N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
81c14b87edf38378b76af207724449cf77f14d71004a3848c0f859749baa2359N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
81c14b87edf38378b76af207724449cf77f14d71004a3848c0f859749baa2359N
-
Size
113KB
-
MD5
e861ff7cad7d40a53443e92985ae5cc0
-
SHA1
76024e8e8e87eb879f5daa79be2e1512c9e30769
-
SHA256
81c14b87edf38378b76af207724449cf77f14d71004a3848c0f859749baa2359
-
SHA512
e15b361cb916a80416249dc2c21696d58223615cd73521988d2d0be1cc232194c21209f83a84d82762d429462b2545057babd070d9c580f87fadc49ea0fe8b22
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RQ:w5eznsjsguGDFqGx8egoxmO3rRQ
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1