General
-
Target
6b9078eca5b1e7a0bc942c839c9999abaa34c2f52caec050115ce771256dd55fN
-
Size
8.7MB
-
Sample
241102-r2rgbazmdj
-
MD5
e14c0d5c99a90f52f6629e8122416820
-
SHA1
4d6309a5c921eda1047440ee8e21c0273c0a3f3f
-
SHA256
6b9078eca5b1e7a0bc942c839c9999abaa34c2f52caec050115ce771256dd55f
-
SHA512
0fe3f1a5ddd06d58ca82bd28a7ccbb651fd9b6ad7cca86de048415994d41e311e587b55c29e214e7d2cc2c2f671cc4d75529fb7bcebbe7bb09305c0cfe3b6bd2
-
SSDEEP
196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCb9:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmp
Static task
static1
Behavioral task
behavioral1
Sample
6b9078eca5b1e7a0bc942c839c9999abaa34c2f52caec050115ce771256dd55fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6b9078eca5b1e7a0bc942c839c9999abaa34c2f52caec050115ce771256dd55fN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
jjj
youri.mooo.com:1605
e936a10f968ac948cd351c9629dbd36d
-
reg_key
e936a10f968ac948cd351c9629dbd36d
-
splitter
|'|'|
Targets
-
-
Target
6b9078eca5b1e7a0bc942c839c9999abaa34c2f52caec050115ce771256dd55fN
-
Size
8.7MB
-
MD5
e14c0d5c99a90f52f6629e8122416820
-
SHA1
4d6309a5c921eda1047440ee8e21c0273c0a3f3f
-
SHA256
6b9078eca5b1e7a0bc942c839c9999abaa34c2f52caec050115ce771256dd55f
-
SHA512
0fe3f1a5ddd06d58ca82bd28a7ccbb651fd9b6ad7cca86de048415994d41e311e587b55c29e214e7d2cc2c2f671cc4d75529fb7bcebbe7bb09305c0cfe3b6bd2
-
SSDEEP
196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCb9:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmp
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1