General
-
Target
eedbd3dacf55cd7cb9a367cfc67ad1bffe94094291397cb689ace2f76c7098f5N.exe
-
Size
23KB
-
Sample
241203-ecfbjaylg1
-
MD5
d6fd585252e2b0938f6d90fce1b86010
-
SHA1
3c0db4b328a79f97b439739e87fcf87ba7fd6fd3
-
SHA256
eedbd3dacf55cd7cb9a367cfc67ad1bffe94094291397cb689ace2f76c7098f5
-
SHA512
432c8d4bca1c499e14b3ff8a0abb886861dd3f7664137c56b355f6134da791e12c365978ed0c1fe42f1cd921b67fe88f5d08a8059cb5063dbcded19a68df6615
-
SSDEEP
384:y8aY1ia0N/IH+WUiWiLcXyUTly2Rc87po6ngB8W+tqlf5mRvR6JZlbw8hqIusZzX:31Re/E+WUiW6ci6NR7tZRpcnuW
Behavioral task
behavioral1
Sample
eedbd3dacf55cd7cb9a367cfc67ad1bffe94094291397cb689ace2f76c7098f5N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eedbd3dacf55cd7cb9a367cfc67ad1bffe94094291397cb689ace2f76c7098f5N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
yOSEF
z24545451383mcvodn.hopto.org:1177
43e69094d76b8f4516f8f345104212b2
-
reg_key
43e69094d76b8f4516f8f345104212b2
-
splitter
|'|'|
Targets
-
-
Target
eedbd3dacf55cd7cb9a367cfc67ad1bffe94094291397cb689ace2f76c7098f5N.exe
-
Size
23KB
-
MD5
d6fd585252e2b0938f6d90fce1b86010
-
SHA1
3c0db4b328a79f97b439739e87fcf87ba7fd6fd3
-
SHA256
eedbd3dacf55cd7cb9a367cfc67ad1bffe94094291397cb689ace2f76c7098f5
-
SHA512
432c8d4bca1c499e14b3ff8a0abb886861dd3f7664137c56b355f6134da791e12c365978ed0c1fe42f1cd921b67fe88f5d08a8059cb5063dbcded19a68df6615
-
SSDEEP
384:y8aY1ia0N/IH+WUiWiLcXyUTly2Rc87po6ngB8W+tqlf5mRvR6JZlbw8hqIusZzX:31Re/E+WUiW6ci6NR7tZRpcnuW
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1