General
-
Target
9c2d4c61a7c85525422c51a2c586b3204cd36ee7e32e0778c4968bd36bb16979N.exe
-
Size
43KB
-
Sample
241130-2yaz9ssner
-
MD5
48843eb13139cd336dd997d873b7ef60
-
SHA1
d3f2cf851060da0979b7e5d2da47b4c3a786bf76
-
SHA256
9c2d4c61a7c85525422c51a2c586b3204cd36ee7e32e0778c4968bd36bb16979
-
SHA512
b200414e0fe08c8b9ad3407b5ddbb7a37d862d85c81da3db9a46f1863ef855eba86ded687ab32cc2156a82ea4ddd6dc0fe1f6a0f4cbce2c1d4712eb6d53981c8
-
SSDEEP
384:mZyaoR5ctOnwtOyW6jlyci8EqnQ4Es472IBzgIij+ZsNO3PlpJKkkjh/TzF7pWnF:8UqAwt/W6pyci8EqQ0479uXQ/om3+L
Behavioral task
behavioral1
Sample
9c2d4c61a7c85525422c51a2c586b3204cd36ee7e32e0778c4968bd36bb16979N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c2d4c61a7c85525422c51a2c586b3204cd36ee7e32e0778c4968bd36bb16979N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
127.0.0.1:9096
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
9c2d4c61a7c85525422c51a2c586b3204cd36ee7e32e0778c4968bd36bb16979N.exe
-
Size
43KB
-
MD5
48843eb13139cd336dd997d873b7ef60
-
SHA1
d3f2cf851060da0979b7e5d2da47b4c3a786bf76
-
SHA256
9c2d4c61a7c85525422c51a2c586b3204cd36ee7e32e0778c4968bd36bb16979
-
SHA512
b200414e0fe08c8b9ad3407b5ddbb7a37d862d85c81da3db9a46f1863ef855eba86ded687ab32cc2156a82ea4ddd6dc0fe1f6a0f4cbce2c1d4712eb6d53981c8
-
SSDEEP
384:mZyaoR5ctOnwtOyW6jlyci8EqnQ4Es472IBzgIij+ZsNO3PlpJKkkjh/TzF7pWnF:8UqAwt/W6pyci8EqQ0479uXQ/om3+L
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1