General
-
Target
Server22.exe
-
Size
287KB
-
Sample
241031-hdjxws1jh1
-
MD5
8416926446f203e874143dd21d534cbc
-
SHA1
0669ed6fa64701b149278e93b7060fc86f1e0950
-
SHA256
701ce077bbe2c27c2496cad43d99ec4c6923c5f56f8d7f286c4e0623a789e79b
-
SHA512
0c255f090613148761abba312fb9256b9dc7a2cd04c01b2745de88012b2928934e06438c3415f1fec40eb6b8f4354b5dd074bcb3b593018fcf6a55ef2b9affc3
-
SSDEEP
3072:pcwb0m2QAsSdADRq6ty71wtYM77ldY7AXTp2kA:5uwH77Ppj0kA
Behavioral task
behavioral1
Sample
Server22.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:8888
a3bfe23a1eca722fceb292fb6eee1294
-
reg_key
a3bfe23a1eca722fceb292fb6eee1294
-
splitter
|'|'|
Targets
-
-
Target
Server22.exe
-
Size
287KB
-
MD5
8416926446f203e874143dd21d534cbc
-
SHA1
0669ed6fa64701b149278e93b7060fc86f1e0950
-
SHA256
701ce077bbe2c27c2496cad43d99ec4c6923c5f56f8d7f286c4e0623a789e79b
-
SHA512
0c255f090613148761abba312fb9256b9dc7a2cd04c01b2745de88012b2928934e06438c3415f1fec40eb6b8f4354b5dd074bcb3b593018fcf6a55ef2b9affc3
-
SSDEEP
3072:pcwb0m2QAsSdADRq6ty71wtYM77ldY7AXTp2kA:5uwH77Ppj0kA
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1