General
-
Target
Server.exe
-
Size
23KB
-
Sample
241202-sf8zxavjhj
-
MD5
eec3e4c86729b800330a8b0312478e58
-
SHA1
93110b4284258f34d73a14c329623be1f1cffb9c
-
SHA256
4e9e0a6041a348e713a6b919cb7f2e0754dd22cb046e1b1ef0e222543038e9ab
-
SHA512
e0cf6aa0110de1eed199ed0c63c5622067f20347ed66a12fb8933b92935699687ecc690ca2d7146a6ceee3f0431563d53c4d988a40dfa8ea29adde5ea5a52a25
-
SSDEEP
384:qYmdk8XvCJrQLdRGSiEYo7Y65gPyx6BDXNRmRvR6JZlbw8hqIusZzZy3ly:9wWkti8aeRpcnuL0
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
njrat
0.7d
HacKed
cnet-contracting.gl.at.ply.gg:10206
cf2a6cabb60ab913a0c3e3caa2c47947
-
reg_key
cf2a6cabb60ab913a0c3e3caa2c47947
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
23KB
-
MD5
eec3e4c86729b800330a8b0312478e58
-
SHA1
93110b4284258f34d73a14c329623be1f1cffb9c
-
SHA256
4e9e0a6041a348e713a6b919cb7f2e0754dd22cb046e1b1ef0e222543038e9ab
-
SHA512
e0cf6aa0110de1eed199ed0c63c5622067f20347ed66a12fb8933b92935699687ecc690ca2d7146a6ceee3f0431563d53c4d988a40dfa8ea29adde5ea5a52a25
-
SSDEEP
384:qYmdk8XvCJrQLdRGSiEYo7Y65gPyx6BDXNRmRvR6JZlbw8hqIusZzZy3ly:9wWkti8aeRpcnuL0
-
Njrat family
-
Modifies Windows Firewall
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1