General
-
Target
SilverBullet.exe
-
Size
2.7MB
-
Sample
241202-dkakks1qcp
-
MD5
63c99c74fa1f1a9174d8f3013c5a870e
-
SHA1
4195ef425ca71b31470f3764bce11f8e17f1b992
-
SHA256
fcbef3a6102e83dad9c7b699cbc37156cd6e0646680628a069cc167052c927b5
-
SHA512
5c74ab8e25a6e60b529cb2ad73db107f5366a198b3721d2054603af458e8aec4d64c0389c1e01d6238ec46a033ac26916e3f3fd85f6806d6e7144231118a4676
-
SSDEEP
24576:nzJhZPEDTvlUx71jUhK/DEgOKSvh1TfFIH9gYRRcY+32oQRLwDQF4eaE2cZPeAgq:nsTt0jUiwg30h/7DQB/FOLDQB2zOQB
Static task
static1
Behavioral task
behavioral1
Sample
SilverBullet.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SilverBullet.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
9cpanel.hackcrack.io:3489
Windows Explorer
-
reg_key
Windows Explorer
-
splitter
|'|'|
Targets
-
-
Target
SilverBullet.exe
-
Size
2.7MB
-
MD5
63c99c74fa1f1a9174d8f3013c5a870e
-
SHA1
4195ef425ca71b31470f3764bce11f8e17f1b992
-
SHA256
fcbef3a6102e83dad9c7b699cbc37156cd6e0646680628a069cc167052c927b5
-
SHA512
5c74ab8e25a6e60b529cb2ad73db107f5366a198b3721d2054603af458e8aec4d64c0389c1e01d6238ec46a033ac26916e3f3fd85f6806d6e7144231118a4676
-
SSDEEP
24576:nzJhZPEDTvlUx71jUhK/DEgOKSvh1TfFIH9gYRRcY+32oQRLwDQF4eaE2cZPeAgq:nsTt0jUiwg30h/7DQB/FOLDQB2zOQB
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1