General
-
Target
335031654ecc1799c90f681ca309b9377d6be0a5561d457cc99ed73e839fbf8fN
-
Size
3.4MB
-
Sample
241106-qn33hs1cjh
-
MD5
7519fab11e73a51ddd403bfc9008cff0
-
SHA1
b1b07a33d54859aaa1e2e6dbc22519051e07e6a9
-
SHA256
335031654ecc1799c90f681ca309b9377d6be0a5561d457cc99ed73e839fbf8f
-
SHA512
81bcc890db76771c0a685787da2660fe5f3117bb965c6ad6b3b6d651bcc22b12a9d415efadc918591eee1c3a59905e5479e7e785d94c35890f84122c01df7f1f
-
SSDEEP
98304:p8Fl84qUQhj3J2CBCoX05otUScs8QKkc7LkCvL:aS4q5jZ2K1WSHCvL
Behavioral task
behavioral1
Sample
335031654ecc1799c90f681ca309b9377d6be0a5561d457cc99ed73e839fbf8fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
335031654ecc1799c90f681ca309b9377d6be0a5561d457cc99ed73e839fbf8fN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
comments-interventions.gl.at.ply.gg:43880
ebcc26f4de39924d996fb09d34793367
-
reg_key
ebcc26f4de39924d996fb09d34793367
-
splitter
|'|'|
Targets
-
-
Target
335031654ecc1799c90f681ca309b9377d6be0a5561d457cc99ed73e839fbf8fN
-
Size
3.4MB
-
MD5
7519fab11e73a51ddd403bfc9008cff0
-
SHA1
b1b07a33d54859aaa1e2e6dbc22519051e07e6a9
-
SHA256
335031654ecc1799c90f681ca309b9377d6be0a5561d457cc99ed73e839fbf8f
-
SHA512
81bcc890db76771c0a685787da2660fe5f3117bb965c6ad6b3b6d651bcc22b12a9d415efadc918591eee1c3a59905e5479e7e785d94c35890f84122c01df7f1f
-
SSDEEP
98304:p8Fl84qUQhj3J2CBCoX05otUScs8QKkc7LkCvL:aS4q5jZ2K1WSHCvL
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1