General
-
Target
99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3.exe
-
Size
37KB
-
Sample
241211-dj4f9stkaw
-
MD5
67931560029cc67967f024e3c42c107a
-
SHA1
fed599a8ee2a821e9f93109d1e660118ff3f0451
-
SHA256
99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3
-
SHA512
85a9a9735e3ba7693ee3d01b808929e48e0ca7d03762ef54a1024ae89238d992310a575fd5c429c62cb2030732dd25033c1ce71e0320c196fd755d62f1c47a96
-
SSDEEP
384:GaiKMizdnjnBhFbJ8ycPzNX9Bwy25FrAF+rMRTyN/0L+EcoinblneHQM3epzXiNR:zignlLJfcPzNXt2zrM+rMRa8NuIVt
Behavioral task
behavioral1
Sample
99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
45.83.207.236:5552
c932779fadb451b44351b10e6e56bf73
-
reg_key
c932779fadb451b44351b10e6e56bf73
-
splitter
|'|'|
Targets
-
-
Target
99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3.exe
-
Size
37KB
-
MD5
67931560029cc67967f024e3c42c107a
-
SHA1
fed599a8ee2a821e9f93109d1e660118ff3f0451
-
SHA256
99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3
-
SHA512
85a9a9735e3ba7693ee3d01b808929e48e0ca7d03762ef54a1024ae89238d992310a575fd5c429c62cb2030732dd25033c1ce71e0320c196fd755d62f1c47a96
-
SSDEEP
384:GaiKMizdnjnBhFbJ8ycPzNX9Bwy25FrAF+rMRTyN/0L+EcoinblneHQM3epzXiNR:zignlLJfcPzNXt2zrM+rMRa8NuIVt
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1