Resubmissions
16-11-2024 15:16
241116-snf9vsydrb 10General
-
Target
download
-
Size
8.7MB
-
Sample
241116-snf9vsydrb
-
MD5
f54be4689944e9619227d20cadaeb1d7
-
SHA1
59f24ac7f02ac74cdd33dcfde64fa795db1b4859
-
SHA256
0ee97cd307a46d4449208faa5205e9345ef0e1f7f6ea0f21d4f7b573318abe4f
-
SHA512
39bca26e07f82efaf0268fdb3c8128f7028980f9cc6d75824b044f0085c88b8e69d4ee464e5c02e8ebf344cb92707f0c23e981e44767999d48d6391404922009
-
SSDEEP
196608:I74BEp+LPU4XrAYycB8aB3QwRP9qWUilUNYfGjH:IREPUUAcGaegVhUzRj
Static task
static1
Behavioral task
behavioral1
Sample
download.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
download.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
Hacked
agentkay.ddns.net:1177
172d8c9948a08740c8556f1c2d338a78
-
reg_key
172d8c9948a08740c8556f1c2d338a78
-
splitter
|'|'|
Targets
-
-
Target
download
-
Size
8.7MB
-
MD5
f54be4689944e9619227d20cadaeb1d7
-
SHA1
59f24ac7f02ac74cdd33dcfde64fa795db1b4859
-
SHA256
0ee97cd307a46d4449208faa5205e9345ef0e1f7f6ea0f21d4f7b573318abe4f
-
SHA512
39bca26e07f82efaf0268fdb3c8128f7028980f9cc6d75824b044f0085c88b8e69d4ee464e5c02e8ebf344cb92707f0c23e981e44767999d48d6391404922009
-
SSDEEP
196608:I74BEp+LPU4XrAYycB8aB3QwRP9qWUilUNYfGjH:IREPUUAcGaegVhUzRj
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1