General
-
Target
Server.exe
-
Size
93KB
-
Sample
241202-vhdmwssrhv
-
MD5
bb3fb4c6cf26e4c493e408d0edb5e829
-
SHA1
88da923e8d993a87b8d8970b54f774b47e2b1dc1
-
SHA256
c52b9ffe033d174b2f93b44280c637e8fed9ec36cbf0a391c72a4e421830c6eb
-
SHA512
4d911914d49355b0ebe006b686dd6075b3ba1aa3aeb6425846cd5203d94683f33cbe44cadf909cd68577e404d628e0bfca6fa33b31dc2f668b5673d6446128c7
-
SSDEEP
1536:MO9r7EkrjaFIs7E5OxFJn8LjEwzGi1dD/DKgS:MOhjau5OfVni1dXP
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
cnet-contracting.gl.at.ply.gg:10206
f660f38bbe0ae15ea88c354f03adbfdc
-
reg_key
f660f38bbe0ae15ea88c354f03adbfdc
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
93KB
-
MD5
bb3fb4c6cf26e4c493e408d0edb5e829
-
SHA1
88da923e8d993a87b8d8970b54f774b47e2b1dc1
-
SHA256
c52b9ffe033d174b2f93b44280c637e8fed9ec36cbf0a391c72a4e421830c6eb
-
SHA512
4d911914d49355b0ebe006b686dd6075b3ba1aa3aeb6425846cd5203d94683f33cbe44cadf909cd68577e404d628e0bfca6fa33b31dc2f668b5673d6446128c7
-
SSDEEP
1536:MO9r7EkrjaFIs7E5OxFJn8LjEwzGi1dD/DKgS:MOhjau5OfVni1dXP
-
Modifies Windows Firewall
-
Drops startup file
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1