General
-
Target
Payload.exe
-
Size
55KB
-
Sample
241203-xrjavavjgq
-
MD5
843cc097164266c5c152f19a41fc5be9
-
SHA1
21cda33595dff7a078f2a9c57ddeebc798cb18a3
-
SHA256
3a769894ceb07a4c0e334562acc0d1c3e1523afee2b74bb8f0e794099889b379
-
SHA512
0130baf712d324b65fd60ca83a6e9931ff13c1a520cc40e77ac7222da3939cd258e314a06f8294a85c6f9c693ed79231649752bf1abf8d1e5db14e39632ed915
-
SSDEEP
1536:BWoADn8fLNG/SbrKDD3wsNMDbXExI3pm4Nm:zADncsqbeDD3wsNMDbXExI3pm
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payload.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
cities-constraints.gl.at.ply.gg:16265
02c50d9a6cd2748a3e6820b9ed4d22d1
-
reg_key
02c50d9a6cd2748a3e6820b9ed4d22d1
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
Payload.exe
-
Size
55KB
-
MD5
843cc097164266c5c152f19a41fc5be9
-
SHA1
21cda33595dff7a078f2a9c57ddeebc798cb18a3
-
SHA256
3a769894ceb07a4c0e334562acc0d1c3e1523afee2b74bb8f0e794099889b379
-
SHA512
0130baf712d324b65fd60ca83a6e9931ff13c1a520cc40e77ac7222da3939cd258e314a06f8294a85c6f9c693ed79231649752bf1abf8d1e5db14e39632ed915
-
SSDEEP
1536:BWoADn8fLNG/SbrKDD3wsNMDbXExI3pm4Nm:zADncsqbeDD3wsNMDbXExI3pm
-
Njrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3