General
-
Target
celex.exe
-
Size
55KB
-
Sample
241202-vvdhnazkdj
-
MD5
059fd4cebd6fa3272a145fc6ef42f5f9
-
SHA1
064b17bfc80151c060e2c2863390bcf7af90a467
-
SHA256
5437080e89ca02f2de4f23eb66533155888bdbf257612326194f6de85a28b524
-
SHA512
4c323cdcd21c10451f5345eeb40ac1b3ccafb80180d46bfc1e85bf40747d45481e649efafd9a01d79e8099cd1b65fba2138919ee9be282f94ecb4d0df2bcec79
-
SSDEEP
1536:sEYADn8fLN2/SbJtDDcwsNMDpXExI3pmmm:+ADnccqbXDDcwsNMDpXExI3pm
Behavioral task
behavioral1
Sample
celex.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
loans-hamburg.gl.at.ply.gg:48460
d5abb059f0ac6ccf0e49c90e494c030a
-
reg_key
d5abb059f0ac6ccf0e49c90e494c030a
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
celex.exe
-
Size
55KB
-
MD5
059fd4cebd6fa3272a145fc6ef42f5f9
-
SHA1
064b17bfc80151c060e2c2863390bcf7af90a467
-
SHA256
5437080e89ca02f2de4f23eb66533155888bdbf257612326194f6de85a28b524
-
SHA512
4c323cdcd21c10451f5345eeb40ac1b3ccafb80180d46bfc1e85bf40747d45481e649efafd9a01d79e8099cd1b65fba2138919ee9be282f94ecb4d0df2bcec79
-
SSDEEP
1536:sEYADn8fLN2/SbJtDDcwsNMDpXExI3pmmm:+ADnccqbXDDcwsNMDpXExI3pm
-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1