General
-
Target
55c09e2d816cf1cd9dd61aaf5929dde2ad194607013875cec32491865b35216dN
-
Size
93KB
-
Sample
241109-qgb1fsvepm
-
MD5
6c4d2452cf967605051579479de8e3a0
-
SHA1
980c0088d1b1ee9cd5e7a0dbc614b09d9d893cfb
-
SHA256
55c09e2d816cf1cd9dd61aaf5929dde2ad194607013875cec32491865b35216d
-
SHA512
f4f96d101e53179b5224bc29149df11446161e4a93d56928c6c23e718dcc4e3099a76633b51eac64a9e48101f978cf843971cb259772106c08af475cfc28558a
-
SSDEEP
1536:AUhSyh6zaoFjuFCVR5jEwzGi1dDVDigS:AUKzaujuCRWi1dRH
Behavioral task
behavioral1
Sample
55c09e2d816cf1cd9dd61aaf5929dde2ad194607013875cec32491865b35216dN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
55c09e2d816cf1cd9dd61aaf5929dde2ad194607013875cec32491865b35216dN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
6.tcp.eu.ngrok.io:10665
503b153ce98cc50ea4d9ae75c01d9f4e
-
reg_key
503b153ce98cc50ea4d9ae75c01d9f4e
-
splitter
|'|'|
Targets
-
-
Target
55c09e2d816cf1cd9dd61aaf5929dde2ad194607013875cec32491865b35216dN
-
Size
93KB
-
MD5
6c4d2452cf967605051579479de8e3a0
-
SHA1
980c0088d1b1ee9cd5e7a0dbc614b09d9d893cfb
-
SHA256
55c09e2d816cf1cd9dd61aaf5929dde2ad194607013875cec32491865b35216d
-
SHA512
f4f96d101e53179b5224bc29149df11446161e4a93d56928c6c23e718dcc4e3099a76633b51eac64a9e48101f978cf843971cb259772106c08af475cfc28558a
-
SSDEEP
1536:AUhSyh6zaoFjuFCVR5jEwzGi1dDVDigS:AUKzaujuCRWi1dRH
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1