General
-
Target
New Client.exe
-
Size
65KB
-
Sample
241029-3k79aa1kct
-
MD5
8cf4617583acf1f05c867d91dfa88e29
-
SHA1
5fdf26cbad2eb6d466bc04199b42b2d40df3159c
-
SHA256
a257729469dd5a70d282e08c5bd87e6e55540e37728368204218745840ffe76e
-
SHA512
1d0513b1a2a81edb244c1d14ab3ec58ca168be562964251b32857a117b66c9fa4de075ee5bbb1f87caf4175c0c9e2414ffe6548aa22354ed2f5c9b480395add6
-
SSDEEP
1536:wfqK4Tm4BoN36t4QviFw1AjHkBnvbKfLteF3nLrB9z3nIaF9brS9vM:wfqK4C4BoN36t4QviFC8EBnefWl9zYaH
Behavioral task
behavioral1
Sample
New Client.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
New Client.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
New Client.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
New Client.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
New Client.exe
Resource
win11-20241023-en
Malware Config
Extracted
njrat
Platinum
HacKed
127.0.0.1:36811
svhost.exe
-
reg_key
svhost.exe
-
splitter
|Ghost|
Targets
-
-
Target
New Client.exe
-
Size
65KB
-
MD5
8cf4617583acf1f05c867d91dfa88e29
-
SHA1
5fdf26cbad2eb6d466bc04199b42b2d40df3159c
-
SHA256
a257729469dd5a70d282e08c5bd87e6e55540e37728368204218745840ffe76e
-
SHA512
1d0513b1a2a81edb244c1d14ab3ec58ca168be562964251b32857a117b66c9fa4de075ee5bbb1f87caf4175c0c9e2414ffe6548aa22354ed2f5c9b480395add6
-
SSDEEP
1536:wfqK4Tm4BoN36t4QviFw1AjHkBnvbKfLteF3nLrB9z3nIaF9brS9vM:wfqK4C4BoN36t4QviFC8EBnefWl9zYaH
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1