General
-
Target
b80e66d22b829d23c8aab126f2f93eae6aaded2ce6599a8e3163a862318869f6N
-
Size
27KB
-
Sample
241110-cd33waxckh
-
MD5
22a9eef4f84d844a7a4fc345a2a7f9b0
-
SHA1
ab456bedb557f7805a025d71071b5d1d6c0c76bf
-
SHA256
b80e66d22b829d23c8aab126f2f93eae6aaded2ce6599a8e3163a862318869f6
-
SHA512
5056b3cebe44d646c92f44b177d6d048df339845cea1d7ed97815df40359ce68a4a5b46c41096cddde249ad917728591e1c7c36f508d26e54a5bc2d46cb0c39e
-
SSDEEP
384:5LJGZoTmgEJbbwvqWGbPxZh7M9AQk93vmhm7UMKmIEecKdbXTzm9bVhcau6Or6eR:J0Nfwj9A/vMHTi9bD
Behavioral task
behavioral1
Sample
b80e66d22b829d23c8aab126f2f93eae6aaded2ce6599a8e3163a862318869f6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b80e66d22b829d23c8aab126f2f93eae6aaded2ce6599a8e3163a862318869f6N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v2.0
HacKed
multiple-simpsons.gl.at.ply.gg:3159
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
b80e66d22b829d23c8aab126f2f93eae6aaded2ce6599a8e3163a862318869f6N
-
Size
27KB
-
MD5
22a9eef4f84d844a7a4fc345a2a7f9b0
-
SHA1
ab456bedb557f7805a025d71071b5d1d6c0c76bf
-
SHA256
b80e66d22b829d23c8aab126f2f93eae6aaded2ce6599a8e3163a862318869f6
-
SHA512
5056b3cebe44d646c92f44b177d6d048df339845cea1d7ed97815df40359ce68a4a5b46c41096cddde249ad917728591e1c7c36f508d26e54a5bc2d46cb0c39e
-
SSDEEP
384:5LJGZoTmgEJbbwvqWGbPxZh7M9AQk93vmhm7UMKmIEecKdbXTzm9bVhcau6Or6eR:J0Nfwj9A/vMHTi9bD
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1