General
-
Target
Venom V5.exe
-
Size
289KB
-
Sample
241123-wbsc5svqar
-
MD5
121a7190a24ba74a4c49c951dd56ad72
-
SHA1
fb5b1adf74cda03d5a77096b866942a6fbd5aa89
-
SHA256
049e3ab43c29a82fc17b415fb88df0b0c238efea6be76a25da1f2bb88ee22a6b
-
SHA512
b1a983027932897e97c4e3ac9865e6fe987c3b772c5847db3f3cc5b8e2b4c845e7040bf8a7e7d546b77c3f78e39c32eaeb7321f1c6f99dd28554c80fec603bb3
-
SSDEEP
6144:6/E7c5W+sPgJJUuCm2pad2AO51SLPml16S6M6supNDdPstxChZ:UEeggJauClpjL5sar6M6supXPstw
Static task
static1
Behavioral task
behavioral1
Sample
Venom V5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Venom V5.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
njrat
v4.0
Victim
audio-ham.gl.at.ply.gg:52424
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
Venom V5.exe
-
Size
289KB
-
MD5
121a7190a24ba74a4c49c951dd56ad72
-
SHA1
fb5b1adf74cda03d5a77096b866942a6fbd5aa89
-
SHA256
049e3ab43c29a82fc17b415fb88df0b0c238efea6be76a25da1f2bb88ee22a6b
-
SHA512
b1a983027932897e97c4e3ac9865e6fe987c3b772c5847db3f3cc5b8e2b4c845e7040bf8a7e7d546b77c3f78e39c32eaeb7321f1c6f99dd28554c80fec603bb3
-
SSDEEP
6144:6/E7c5W+sPgJJUuCm2pad2AO51SLPml16S6M6supNDdPstxChZ:UEeggJauClpjL5sar6M6supXPstw
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1