General
-
Target
Server.exe
-
Size
287KB
-
Sample
241031-haztyatnan
-
MD5
ea17b12f90b9d9f940454651bb23ddb2
-
SHA1
1f06fc12afcf267d8663bf92e00a09c46b68c849
-
SHA256
c178a4227f0869c0ec5b0cc1d1ebff42a82a4b3f23e71c2fdccf5673d1f5e287
-
SHA512
62086639d824584da2c269bc31932efe8660732dcd15f071436e794fb8687e2b89c1551d6439dcb0e5f02213bdbdbf078c4b220b39ac64c79e9c98dbf3f632a9
-
SSDEEP
3072:Acwb092QAsSdADRq6ty71wtYM77ldY7AXTp2kA:ZuwH77Ppj0kA
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:8888
a3bfe23a1eca722fceb292fb6eee1294
-
reg_key
a3bfe23a1eca722fceb292fb6eee1294
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
287KB
-
MD5
ea17b12f90b9d9f940454651bb23ddb2
-
SHA1
1f06fc12afcf267d8663bf92e00a09c46b68c849
-
SHA256
c178a4227f0869c0ec5b0cc1d1ebff42a82a4b3f23e71c2fdccf5673d1f5e287
-
SHA512
62086639d824584da2c269bc31932efe8660732dcd15f071436e794fb8687e2b89c1551d6439dcb0e5f02213bdbdbf078c4b220b39ac64c79e9c98dbf3f632a9
-
SSDEEP
3072:Acwb092QAsSdADRq6ty71wtYM77ldY7AXTp2kA:ZuwH77Ppj0kA
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1