General
-
Target
06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8
-
Size
23KB
-
Sample
241124-xzp4csvlcw
-
MD5
dbd6e806a9569164117e585f0af40eef
-
SHA1
3ba711b2eb5777970c393c5ccb1af6ff8736ffaf
-
SHA256
06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8
-
SHA512
d3ec6e916642cd3996a1e54ba1758a932400184569c8007e4d71732e3b3a39a1b125acfc24af56f3a155840d535e4b8539d8eef7e2480a4274e1900a06642a02
-
SSDEEP
384:PTMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZad9:PMb9glF51LRpcnu19
Behavioral task
behavioral1
Sample
06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
djwolfdz2.ddns.net:3389
9d770d5d68d419ae777037dcfd1a78d4
-
reg_key
9d770d5d68d419ae777037dcfd1a78d4
-
splitter
|'|'|
Targets
-
-
Target
06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8
-
Size
23KB
-
MD5
dbd6e806a9569164117e585f0af40eef
-
SHA1
3ba711b2eb5777970c393c5ccb1af6ff8736ffaf
-
SHA256
06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8
-
SHA512
d3ec6e916642cd3996a1e54ba1758a932400184569c8007e4d71732e3b3a39a1b125acfc24af56f3a155840d535e4b8539d8eef7e2480a4274e1900a06642a02
-
SSDEEP
384:PTMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZad9:PMb9glF51LRpcnu19
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1