General
-
Target
Server.exe
-
Size
93KB
-
Sample
241117-zcq39axmbs
-
MD5
77569c49188ab04b3ed8fef0dfbef2cf
-
SHA1
413db869e07385a42e1f9a1209822fa41ec8cf8a
-
SHA256
dee23e85d531e80655457b017752bb99378ba91819e5a85ccf9343a1094a1a4c
-
SHA512
ea2b7c6e94f0559f9d1ac48f797e4fe40849e531088cb4a145247d6ad9da9488f2ce1acf0f7384ecf7df8fb5165470919de75e12cd2bf554d47cde14853ffe2a
-
SSDEEP
1536:RGbJD/HBZbszKu9AZpd7r1jEwzGi1dD3DEgS:RGqzK4AZ3HCi1dn9
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
paper-cancelled.gl.at.ply.gg:51045
7771b946967346d29becdca43bc7858a
-
reg_key
7771b946967346d29becdca43bc7858a
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
93KB
-
MD5
77569c49188ab04b3ed8fef0dfbef2cf
-
SHA1
413db869e07385a42e1f9a1209822fa41ec8cf8a
-
SHA256
dee23e85d531e80655457b017752bb99378ba91819e5a85ccf9343a1094a1a4c
-
SHA512
ea2b7c6e94f0559f9d1ac48f797e4fe40849e531088cb4a145247d6ad9da9488f2ce1acf0f7384ecf7df8fb5165470919de75e12cd2bf554d47cde14853ffe2a
-
SSDEEP
1536:RGbJD/HBZbszKu9AZpd7r1jEwzGi1dD3DEgS:RGqzK4AZ3HCi1dn9
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1