General
-
Target
e5bc0b1ea99391015f0199473250774663e13e5749bed3ed4f0205ffb94ea474
-
Size
423KB
-
Sample
241106-ezdq8avgjn
-
MD5
3d13e23fbf55b900900c939862fc0048
-
SHA1
7cd85cba33cb654c31b9103cea941e70271c9c68
-
SHA256
e5bc0b1ea99391015f0199473250774663e13e5749bed3ed4f0205ffb94ea474
-
SHA512
b5fb18102a89145b67460b69c5f647ce78adaae37542b7f2c15f6a606c898101730487c0ffe2ba1525114e4bcbcc88d599cb894539239da38968964a2481cc64
-
SSDEEP
12288:fTyY67zIjG4Kf7JiI7BKjkLOOkRE0XLWMJut:f87zIjH4iOBokKOkDZJut
Static task
static1
Behavioral task
behavioral1
Sample
e5bc0b1ea99391015f0199473250774663e13e5749bed3ed4f0205ffb94ea474.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e5bc0b1ea99391015f0199473250774663e13e5749bed3ed4f0205ffb94ea474.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.6.4
Moh
diga.myftp.org:1194
96df218067aa38f2987ac5ab00b8da99
-
reg_key
96df218067aa38f2987ac5ab00b8da99
-
splitter
|'|'|
Targets
-
-
Target
e5bc0b1ea99391015f0199473250774663e13e5749bed3ed4f0205ffb94ea474
-
Size
423KB
-
MD5
3d13e23fbf55b900900c939862fc0048
-
SHA1
7cd85cba33cb654c31b9103cea941e70271c9c68
-
SHA256
e5bc0b1ea99391015f0199473250774663e13e5749bed3ed4f0205ffb94ea474
-
SHA512
b5fb18102a89145b67460b69c5f647ce78adaae37542b7f2c15f6a606c898101730487c0ffe2ba1525114e4bcbcc88d599cb894539239da38968964a2481cc64
-
SSDEEP
12288:fTyY67zIjG4Kf7JiI7BKjkLOOkRE0XLWMJut:f87zIjH4iOBokKOkDZJut
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1