General
-
Target
0x0009000000016af7-8.dat
-
Size
27KB
-
Sample
241102-z6549swdlm
-
MD5
d010a1a6e4e73e19b88c1f280c417a43
-
SHA1
99ac6501fee007d1ea4409ce9a1535d7298acc90
-
SHA256
2ca5d6bd734ac603e9c5064611ee6f0fab62005a85ffdb9e1c180aa4e0a18353
-
SHA512
b21fa039145b9b4e37686fe420d012b8d7c61913f5db237f56e4bc4ee14f90cb21aeb33f2f2f359ee6d4626230e278c6de860b1b79e48861f027a6c7c571d645
-
SSDEEP
384:cLBBi/W/7mgEp87wYK2GePqZhbMzAQk93vmhm7UMKmIEecKdbXTzm9bVhcac6urZ:6W/sqoHTzA/vMHTi9bD
Behavioral task
behavioral1
Sample
0x0009000000016af7-8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0x0009000000016af7-8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v4.0
HacKed
94.46.207.10:1177
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
0x0009000000016af7-8.dat
-
Size
27KB
-
MD5
d010a1a6e4e73e19b88c1f280c417a43
-
SHA1
99ac6501fee007d1ea4409ce9a1535d7298acc90
-
SHA256
2ca5d6bd734ac603e9c5064611ee6f0fab62005a85ffdb9e1c180aa4e0a18353
-
SHA512
b21fa039145b9b4e37686fe420d012b8d7c61913f5db237f56e4bc4ee14f90cb21aeb33f2f2f359ee6d4626230e278c6de860b1b79e48861f027a6c7c571d645
-
SSDEEP
384:cLBBi/W/7mgEp87wYK2GePqZhbMzAQk93vmhm7UMKmIEecKdbXTzm9bVhcac6urZ:6W/sqoHTzA/vMHTi9bD
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1