General
-
Target
28fdca28192129132697fd2351bddf5262d195ca8213b2cd4214777f08ad088c.exe
-
Size
93KB
-
Sample
241121-l22dma1akd
-
MD5
082ed356940b12a76378f7b28ac59ee2
-
SHA1
03f85a2a4947a7c21b719b0a711a33bda85b3c27
-
SHA256
28fdca28192129132697fd2351bddf5262d195ca8213b2cd4214777f08ad088c
-
SHA512
72f5182ea437d66372c808045cf34868fc447aceaceb886a36b55b96cbc94a960ff1e3153f3961dad129c186e8440741ae4a96ac9298d7be5a6081a8332030a9
-
SSDEEP
768:LY3WgBBkpjTMpALPGMtsas88EtNXhe9f1mxCXxrjEtCdnl2pi1Rz4Rk3KsGdpSgr:zgjkVbPGHz88EbW1pjEwzGi1dDmDSgSA
Behavioral task
behavioral1
Sample
28fdca28192129132697fd2351bddf5262d195ca8213b2cd4214777f08ad088c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28fdca28192129132697fd2351bddf5262d195ca8213b2cd4214777f08ad088c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:7777
f24666adf22d8a7ee39c578f56a54267
-
reg_key
f24666adf22d8a7ee39c578f56a54267
-
splitter
|'|'|
Targets
-
-
Target
28fdca28192129132697fd2351bddf5262d195ca8213b2cd4214777f08ad088c.exe
-
Size
93KB
-
MD5
082ed356940b12a76378f7b28ac59ee2
-
SHA1
03f85a2a4947a7c21b719b0a711a33bda85b3c27
-
SHA256
28fdca28192129132697fd2351bddf5262d195ca8213b2cd4214777f08ad088c
-
SHA512
72f5182ea437d66372c808045cf34868fc447aceaceb886a36b55b96cbc94a960ff1e3153f3961dad129c186e8440741ae4a96ac9298d7be5a6081a8332030a9
-
SSDEEP
768:LY3WgBBkpjTMpALPGMtsas88EtNXhe9f1mxCXxrjEtCdnl2pi1Rz4Rk3KsGdpSgr:zgjkVbPGHz88EbW1pjEwzGi1dDmDSgSA
-
Njrat family
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1