General
-
Target
1410fa76c2dcabd3ca7b07e6896130dde15ba9f69ce35470e01e94c9187f7eb0
-
Size
37KB
-
Sample
241028-yxx7matqbs
-
MD5
586bdf17a89399e35f52295c6cffde36
-
SHA1
5dc8a61210a1cf3de9334bee3badf31d5a21cf52
-
SHA256
1410fa76c2dcabd3ca7b07e6896130dde15ba9f69ce35470e01e94c9187f7eb0
-
SHA512
58e36a36ed0f32d511ff63aba1ed4441ac907a2cdf3e9607167dff7ed85079cbefe3446328bc92b7a5bb2d06fb22f85b35f8cc014bdb95927c7742c07e43f2af
-
SSDEEP
768:cMY2J0gThx1mHPtudiYrgwRHVZ2ZZxgU7XcWquNTlqoueVd9uPsEc:T7JLZGGiY8w12rxVR79Pj9uPsp
Static task
static1
Behavioral task
behavioral1
Sample
1410fa76c2dcabd3ca7b07e6896130dde15ba9f69ce35470e01e94c9187f7eb0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1410fa76c2dcabd3ca7b07e6896130dde15ba9f69ce35470e01e94c9187f7eb0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
mohib
127.0.0.1:1978
db87e501efb3fe970d1a4a7aa5744b5f
-
reg_key
db87e501efb3fe970d1a4a7aa5744b5f
-
splitter
|'|'|
Targets
-
-
Target
1410fa76c2dcabd3ca7b07e6896130dde15ba9f69ce35470e01e94c9187f7eb0
-
Size
37KB
-
MD5
586bdf17a89399e35f52295c6cffde36
-
SHA1
5dc8a61210a1cf3de9334bee3badf31d5a21cf52
-
SHA256
1410fa76c2dcabd3ca7b07e6896130dde15ba9f69ce35470e01e94c9187f7eb0
-
SHA512
58e36a36ed0f32d511ff63aba1ed4441ac907a2cdf3e9607167dff7ed85079cbefe3446328bc92b7a5bb2d06fb22f85b35f8cc014bdb95927c7742c07e43f2af
-
SSDEEP
768:cMY2J0gThx1mHPtudiYrgwRHVZ2ZZxgU7XcWquNTlqoueVd9uPsEc:T7JLZGGiY8w12rxVR79Pj9uPsp
-
Njrat family
-
Modifies Windows Firewall
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1