General
-
Target
d36ff93c9dd527e80640d23df22f89b42d8122e737e1d2c49423730123711dee.exe
-
Size
23KB
-
Sample
241128-ql155svjaq
-
MD5
95e5c3870eca37058e843dc41daf042e
-
SHA1
3e3a771c03d9ef0340b91733f870bc26ced1228f
-
SHA256
d36ff93c9dd527e80640d23df22f89b42d8122e737e1d2c49423730123711dee
-
SHA512
184f0a0f2ccdb9994d7f58ef322cba39686c56f89bae6846e597db0da5811e368a8f7e8b7acfe7b38a94e074a6b95df4ebac969691c9c016e27e34efff3e86c1
-
SSDEEP
384:poWSkWHa55BgDVRGipkItzY6vZg36Eh7FpmRvR6JZlbw8hqIusZzZQ7J:+Juk9pHRpcnuFJ
Behavioral task
behavioral1
Sample
d36ff93c9dd527e80640d23df22f89b42d8122e737e1d2c49423730123711dee.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d36ff93c9dd527e80640d23df22f89b42d8122e737e1d2c49423730123711dee.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Madest 0.7d
HacKed
neexileeee.ddns.net:1604
ad223c181f76c0d1c9788200b640f54f
-
reg_key
ad223c181f76c0d1c9788200b640f54f
-
splitter
|'|'|
Targets
-
-
Target
d36ff93c9dd527e80640d23df22f89b42d8122e737e1d2c49423730123711dee.exe
-
Size
23KB
-
MD5
95e5c3870eca37058e843dc41daf042e
-
SHA1
3e3a771c03d9ef0340b91733f870bc26ced1228f
-
SHA256
d36ff93c9dd527e80640d23df22f89b42d8122e737e1d2c49423730123711dee
-
SHA512
184f0a0f2ccdb9994d7f58ef322cba39686c56f89bae6846e597db0da5811e368a8f7e8b7acfe7b38a94e074a6b95df4ebac969691c9c016e27e34efff3e86c1
-
SSDEEP
384:poWSkWHa55BgDVRGipkItzY6vZg36Eh7FpmRvR6JZlbw8hqIusZzZQ7J:+Juk9pHRpcnuFJ
-
Njrat family
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1