General
-
Target
5731157a1e86abe974e4cad956a53dee2795d87aa7ee23215f7d4b28dc6b9e6f
-
Size
488KB
-
Sample
241207-2srqtstlfj
-
MD5
0e33819a10f6d174189c8d71ffb671f1
-
SHA1
d617a34a88c424ed60f93ce60f091dd235354ad0
-
SHA256
5731157a1e86abe974e4cad956a53dee2795d87aa7ee23215f7d4b28dc6b9e6f
-
SHA512
ec1e7376df583d9f65feb6bbe95c15fc04b0f8242111b1496029a5932ccf802fea31b9c7171415829f258980591d9d141c304597849c87f6acb0c92baf7634aa
-
SSDEEP
6144:08JsLcpjzTDDmHayakLkrb4NSarQWYmdUfKyt9XDeXYobgP:RzxzTDWikLSb4NS79mdUfH9zeXYobi
Static task
static1
Behavioral task
behavioral1
Sample
5731157a1e86abe974e4cad956a53dee2795d87aa7ee23215f7d4b28dc6b9e6f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5731157a1e86abe974e4cad956a53dee2795d87aa7ee23215f7d4b28dc6b9e6f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
2.tcp.eu.ngrok.io:15986
198d41d5fe2cbc3d7b66a9e7a223f914
-
reg_key
198d41d5fe2cbc3d7b66a9e7a223f914
-
splitter
|'|'|
Targets
-
-
Target
5731157a1e86abe974e4cad956a53dee2795d87aa7ee23215f7d4b28dc6b9e6f
-
Size
488KB
-
MD5
0e33819a10f6d174189c8d71ffb671f1
-
SHA1
d617a34a88c424ed60f93ce60f091dd235354ad0
-
SHA256
5731157a1e86abe974e4cad956a53dee2795d87aa7ee23215f7d4b28dc6b9e6f
-
SHA512
ec1e7376df583d9f65feb6bbe95c15fc04b0f8242111b1496029a5932ccf802fea31b9c7171415829f258980591d9d141c304597849c87f6acb0c92baf7634aa
-
SSDEEP
6144:08JsLcpjzTDDmHayakLkrb4NSarQWYmdUfKyt9XDeXYobgP:RzxzTDWikLSb4NS79mdUfH9zeXYobi
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1