General
-
Target
1bf328416c90441cfbd32c37acb0628235abcfc58a9513e44ae5a65b7a5dd572.exe
-
Size
23KB
-
Sample
241204-1j69gsylal
-
MD5
77e598446339dd71842fc4e815e08657
-
SHA1
d3cafa3ad4fffa97f9c41f7e05385e57a6bd053c
-
SHA256
1bf328416c90441cfbd32c37acb0628235abcfc58a9513e44ae5a65b7a5dd572
-
SHA512
e9be715c9eaa1c52c6cd83031a5e58e90ed28acc8b2f06d88dcd10af28942d098e9e783e4f697ea87508099ae7578d06f1cf7b1dd06cffd7b3b27ba1ecae095c
-
SSDEEP
384:9luBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZg67b:SOmhtIiRpcnuf0b
Behavioral task
behavioral1
Sample
1bf328416c90441cfbd32c37acb0628235abcfc58a9513e44ae5a65b7a5dd572.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1bf328416c90441cfbd32c37acb0628235abcfc58a9513e44ae5a65b7a5dd572.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
Lammer
bielserver.duckdns.org:7778
6c26bb082e8cb4ff278e1067d3256202
-
reg_key
6c26bb082e8cb4ff278e1067d3256202
-
splitter
|'|'|
Targets
-
-
Target
1bf328416c90441cfbd32c37acb0628235abcfc58a9513e44ae5a65b7a5dd572.exe
-
Size
23KB
-
MD5
77e598446339dd71842fc4e815e08657
-
SHA1
d3cafa3ad4fffa97f9c41f7e05385e57a6bd053c
-
SHA256
1bf328416c90441cfbd32c37acb0628235abcfc58a9513e44ae5a65b7a5dd572
-
SHA512
e9be715c9eaa1c52c6cd83031a5e58e90ed28acc8b2f06d88dcd10af28942d098e9e783e4f697ea87508099ae7578d06f1cf7b1dd06cffd7b3b27ba1ecae095c
-
SSDEEP
384:9luBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZg67b:SOmhtIiRpcnuf0b
-
Njrat family
-
Modifies Windows Firewall
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1