General
-
Target
main.exe
-
Size
65KB
-
Sample
241213-m44r7sxrfm
-
MD5
915756ae44759560e8476467163b0f5d
-
SHA1
02c6eeb6a68c4fab801061321645c3cf118b823a
-
SHA256
0a5fe6735794d87d1cb917aa4b92947f571eff6b5541008cc1f76a666df4fbfb
-
SHA512
4d7b862f7e4dd4856eac8e5982eb7ed10afddb943661b84cd8f06293fed80e26a65595a89b6abdd1d99bd6154791169006a6d0a4f572de756a691cfb9889049c
-
SSDEEP
1536:bukC8Q3PoN36tJQviFw1noU5BnvA7fLteF3nLrB9z3n+aF9buS9vM:bukC8Q3PoN36tJQviFCocBnIfWl9zOa+
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Platinum
HacKed
127.0.0.1:25565
dllhost.exe
-
reg_key
dllhost.exe
-
splitter
|Ghost|
Targets
-
-
Target
main.exe
-
Size
65KB
-
MD5
915756ae44759560e8476467163b0f5d
-
SHA1
02c6eeb6a68c4fab801061321645c3cf118b823a
-
SHA256
0a5fe6735794d87d1cb917aa4b92947f571eff6b5541008cc1f76a666df4fbfb
-
SHA512
4d7b862f7e4dd4856eac8e5982eb7ed10afddb943661b84cd8f06293fed80e26a65595a89b6abdd1d99bd6154791169006a6d0a4f572de756a691cfb9889049c
-
SSDEEP
1536:bukC8Q3PoN36tJQviFw1noU5BnvA7fLteF3nLrB9z3n+aF9buS9vM:bukC8Q3PoN36tJQviFCocBnIfWl9zOa+
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1