General
-
Target
583d90996df6c2bacf096ea2f662bb576020e82019d33f75754158da8eae95f8
-
Size
43KB
-
Sample
241201-16pyqazjfk
-
MD5
fc42df7b6686f2c15ef715839e5ad116
-
SHA1
035fe04df5483e2f820b0c69f037111008c80a38
-
SHA256
583d90996df6c2bacf096ea2f662bb576020e82019d33f75754158da8eae95f8
-
SHA512
afa68a9f10dc012ef10ff2dea8ac52276c4904b2c9f4686a01fe9fbb7201be6f315f44df0a0e36b50ba9c6a3901c06014c30966437487bc63928de1eecae5637
-
SSDEEP
384:vZyAj3n1iDcsyEqtlzQAyuqEZGyeEtzcIij+ZsNO3PlpJKkkjh/TzF7pWnY/greT:RL3nU4pEqtVQAxuypuXQ/oh3+L
Behavioral task
behavioral1
Sample
583d90996df6c2bacf096ea2f662bb576020e82019d33f75754158da8eae95f8.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
583d90996df6c2bacf096ea2f662bb576020e82019d33f75754158da8eae95f8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
127.0.0.1:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
583d90996df6c2bacf096ea2f662bb576020e82019d33f75754158da8eae95f8
-
Size
43KB
-
MD5
fc42df7b6686f2c15ef715839e5ad116
-
SHA1
035fe04df5483e2f820b0c69f037111008c80a38
-
SHA256
583d90996df6c2bacf096ea2f662bb576020e82019d33f75754158da8eae95f8
-
SHA512
afa68a9f10dc012ef10ff2dea8ac52276c4904b2c9f4686a01fe9fbb7201be6f315f44df0a0e36b50ba9c6a3901c06014c30966437487bc63928de1eecae5637
-
SSDEEP
384:vZyAj3n1iDcsyEqtlzQAyuqEZGyeEtzcIij+ZsNO3PlpJKkkjh/TzF7pWnY/greT:RL3nU4pEqtVQAxuypuXQ/oh3+L
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1