General
-
Target
4309c147d9b34dbf0853e020c164902d514f92f770c362dfa3c044802fae8e6fN
-
Size
23KB
-
Sample
241026-nafzqa1pgw
-
MD5
c6709a915c0a385a6c10eae5dbce2cc0
-
SHA1
0ddd4094a4901c977fdf9dd2d6362e515fe79146
-
SHA256
4309c147d9b34dbf0853e020c164902d514f92f770c362dfa3c044802fae8e6f
-
SHA512
7bf847e034e36c96a75fbf490cb2fb25702d80230c46d6f6a4efa1ce7502673a3de84a4a9801096bdc026fb4ce18486d03e70232fbc1d14fa294815f4280f4be
-
SSDEEP
384:IoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI3:37O89p2rRpcnuZ
Behavioral task
behavioral1
Sample
4309c147d9b34dbf0853e020c164902d514f92f770c362dfa3c044802fae8e6fN.exe
Resource
win11-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
10.10.1.11:5552
7657c14284185fbd3fb108b43c7467ba
-
reg_key
7657c14284185fbd3fb108b43c7467ba
-
splitter
|'|'|
Targets
-
-
Target
4309c147d9b34dbf0853e020c164902d514f92f770c362dfa3c044802fae8e6fN
-
Size
23KB
-
MD5
c6709a915c0a385a6c10eae5dbce2cc0
-
SHA1
0ddd4094a4901c977fdf9dd2d6362e515fe79146
-
SHA256
4309c147d9b34dbf0853e020c164902d514f92f770c362dfa3c044802fae8e6f
-
SHA512
7bf847e034e36c96a75fbf490cb2fb25702d80230c46d6f6a4efa1ce7502673a3de84a4a9801096bdc026fb4ce18486d03e70232fbc1d14fa294815f4280f4be
-
SSDEEP
384:IoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI3:37O89p2rRpcnuZ
-
Njrat family
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1