General
-
Target
12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485N.exe
-
Size
584KB
-
Sample
241127-1lwkrs1rfv
-
MD5
488106a5ca274bef94d5dd8c8cd23060
-
SHA1
1e291b498ff752b54a93aeb70b0819d2f439b088
-
SHA256
12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485
-
SHA512
507f8b16e4d015bb47ec9bab7c48a4be533b50987bd912fe487ae1c6bab2149c1cac12de12e8c57971147ac677daa7c828f5f878c0bfc55f6c44a882f1c35163
-
SSDEEP
12288:mqEfpOSxyOF6q/68tLZL+w2hK3x8HPObaoE3anW2YrdA:mqSOStFYA+Kh8HPObfEqner
Static task
static1
Behavioral task
behavioral1
Sample
12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.6.4
HacKed
aboudmonster.no-ip.biz:1177
0e8ba634604a9137fcb419c959897c24
-
reg_key
0e8ba634604a9137fcb419c959897c24
-
splitter
|'|'|
Targets
-
-
Target
12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485N.exe
-
Size
584KB
-
MD5
488106a5ca274bef94d5dd8c8cd23060
-
SHA1
1e291b498ff752b54a93aeb70b0819d2f439b088
-
SHA256
12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485
-
SHA512
507f8b16e4d015bb47ec9bab7c48a4be533b50987bd912fe487ae1c6bab2149c1cac12de12e8c57971147ac677daa7c828f5f878c0bfc55f6c44a882f1c35163
-
SSDEEP
12288:mqEfpOSxyOF6q/68tLZL+w2hK3x8HPObaoE3anW2YrdA:mqSOStFYA+Kh8HPObfEqner
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1