General
-
Target
a78f3743cd22750600d9e73ad8678ee43b9eaa8cbce0efb27858b1dd0ab14e59N
-
Size
93KB
-
Sample
241110-l1m5lsxpcq
-
MD5
b9777e6821659e565e88106afe2aaeb0
-
SHA1
fa4eadcbcf3b771bb02a24275a1a961f7a6eb253
-
SHA256
a78f3743cd22750600d9e73ad8678ee43b9eaa8cbce0efb27858b1dd0ab14e59
-
SHA512
2335abc6f07eff5312d17c63fed9bac9bcca1b16486e56fabe2945c79d5fc3f9644a99c3a1f48b53fa02ef691bb678cc29c062a51657617c21b71d412d20ef0c
-
SSDEEP
768:dY3GUfhWXxyFcxovUKUJuROprXtWN8eYhYbmXxrjEtCdnl2pi1Rz4Rk3XsGdpTgM:RU5WhIUKcuOJhPhBjEwzGi1dDDDTgS
Behavioral task
behavioral1
Sample
a78f3743cd22750600d9e73ad8678ee43b9eaa8cbce0efb27858b1dd0ab14e59N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a78f3743cd22750600d9e73ad8678ee43b9eaa8cbce0efb27858b1dd0ab14e59N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
skibidi
hakim32.ddns.net:2000
127.0.0.1:8848
642760713eaf9ba9d83af2740513d99b
-
reg_key
642760713eaf9ba9d83af2740513d99b
-
splitter
|'|'|
Targets
-
-
Target
a78f3743cd22750600d9e73ad8678ee43b9eaa8cbce0efb27858b1dd0ab14e59N
-
Size
93KB
-
MD5
b9777e6821659e565e88106afe2aaeb0
-
SHA1
fa4eadcbcf3b771bb02a24275a1a961f7a6eb253
-
SHA256
a78f3743cd22750600d9e73ad8678ee43b9eaa8cbce0efb27858b1dd0ab14e59
-
SHA512
2335abc6f07eff5312d17c63fed9bac9bcca1b16486e56fabe2945c79d5fc3f9644a99c3a1f48b53fa02ef691bb678cc29c062a51657617c21b71d412d20ef0c
-
SSDEEP
768:dY3GUfhWXxyFcxovUKUJuROprXtWN8eYhYbmXxrjEtCdnl2pi1Rz4Rk3XsGdpTgM:RU5WhIUKcuOJhPhBjEwzGi1dDDDTgS
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1