General
-
Target
assasasa.exe
-
Size
287KB
-
Sample
241031-1xw1nsthrk
-
MD5
11ea1c7e0deea44c82127cd46f47a074
-
SHA1
005849c2f425a844b23c27a9079347e037e588fd
-
SHA256
fceda118c3aef32d1d7ba4682b75cd9b81423544b820f02acbb6e99f10eb5813
-
SHA512
5296be8822283f6ffc1c6168b1c2d85907b24f6e1127c77125cc522744c5249a77c45715f5e16b914e9bea2580d0e5a3a3e613ddaa2532713e9a66fbd93905e4
-
SSDEEP
3072:SC8w0v2QAsSdADRq6ty71wtYM77ldY7AXTp2kA:guwH77Ppj0kA
Behavioral task
behavioral1
Sample
assasasa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
assasasa.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
192.168.0.48:7777
b351ae25e7d6d74143f9d5d9cfdc57c2
-
reg_key
b351ae25e7d6d74143f9d5d9cfdc57c2
-
splitter
|'|'|
Targets
-
-
Target
assasasa.exe
-
Size
287KB
-
MD5
11ea1c7e0deea44c82127cd46f47a074
-
SHA1
005849c2f425a844b23c27a9079347e037e588fd
-
SHA256
fceda118c3aef32d1d7ba4682b75cd9b81423544b820f02acbb6e99f10eb5813
-
SHA512
5296be8822283f6ffc1c6168b1c2d85907b24f6e1127c77125cc522744c5249a77c45715f5e16b914e9bea2580d0e5a3a3e613ddaa2532713e9a66fbd93905e4
-
SSDEEP
3072:SC8w0v2QAsSdADRq6ty71wtYM77ldY7AXTp2kA:guwH77Ppj0kA
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1