General
-
Target
bf1c69aba40885eb0054d51112e1afeeb44097f9127089f4ba80aa8d2091dab8N.exe
-
Size
23KB
-
Sample
241205-a7gqmazlcy
-
MD5
ad38f19d1cd91d87380e51320460d7d0
-
SHA1
4899fb4dc7e32438125f0bf4fe55519b8f041da0
-
SHA256
bf1c69aba40885eb0054d51112e1afeeb44097f9127089f4ba80aa8d2091dab8
-
SHA512
2272bf1aaceeb42794bac65982b403662d6c12dc395138735d2f6d4635cecd55de047a1ab76360efc41c05dc9f32e4b5ed09dffc7cb2ca60353338b0b823ea1f
-
SSDEEP
384:9luBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZg67:SOmhtIiRpcnuf0
Behavioral task
behavioral1
Sample
bf1c69aba40885eb0054d51112e1afeeb44097f9127089f4ba80aa8d2091dab8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf1c69aba40885eb0054d51112e1afeeb44097f9127089f4ba80aa8d2091dab8N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
Lammer
bielserver.duckdns.org:7778
6c26bb082e8cb4ff278e1067d3256202
-
reg_key
6c26bb082e8cb4ff278e1067d3256202
-
splitter
|'|'|
Targets
-
-
Target
bf1c69aba40885eb0054d51112e1afeeb44097f9127089f4ba80aa8d2091dab8N.exe
-
Size
23KB
-
MD5
ad38f19d1cd91d87380e51320460d7d0
-
SHA1
4899fb4dc7e32438125f0bf4fe55519b8f041da0
-
SHA256
bf1c69aba40885eb0054d51112e1afeeb44097f9127089f4ba80aa8d2091dab8
-
SHA512
2272bf1aaceeb42794bac65982b403662d6c12dc395138735d2f6d4635cecd55de047a1ab76360efc41c05dc9f32e4b5ed09dffc7cb2ca60353338b0b823ea1f
-
SSDEEP
384:9luBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZg67:SOmhtIiRpcnuf0
-
Njrat family
-
Modifies Windows Firewall
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1