General
-
Target
bc37b896fee26a5b4de7845cdd046e0200c783d4907ffa7e16da84ed6b5987dd.exe
-
Size
27KB
-
Sample
241214-pq1jqssje1
-
MD5
7bf897ca59b77ad3069c07149c35f97e
-
SHA1
6951dc20fa1e550ec9d066fe20e5100a9946a56b
-
SHA256
bc37b896fee26a5b4de7845cdd046e0200c783d4907ffa7e16da84ed6b5987dd
-
SHA512
6e0725043262eec328130883b8c6a413c03fa11e766db44e6e2595dfa5d3e13d02b7a199105cad8439c66238cf2975099d40b33cdaeb4768da159060b6f35daf
-
SSDEEP
384:rLptwff1tqGIOfIBTkqS61bPGdrNM1AQk93vmhm7UMKmIEecKdbXTzm9bVhcar6v:/pqffy3LN1A/vMHTi9bD
Behavioral task
behavioral1
Sample
bc37b896fee26a5b4de7845cdd046e0200c783d4907ffa7e16da84ed6b5987dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc37b896fee26a5b4de7845cdd046e0200c783d4907ffa7e16da84ed6b5987dd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v2.0
HaCkEd
quite-cs.at.ply.gg:10397
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
bc37b896fee26a5b4de7845cdd046e0200c783d4907ffa7e16da84ed6b5987dd.exe
-
Size
27KB
-
MD5
7bf897ca59b77ad3069c07149c35f97e
-
SHA1
6951dc20fa1e550ec9d066fe20e5100a9946a56b
-
SHA256
bc37b896fee26a5b4de7845cdd046e0200c783d4907ffa7e16da84ed6b5987dd
-
SHA512
6e0725043262eec328130883b8c6a413c03fa11e766db44e6e2595dfa5d3e13d02b7a199105cad8439c66238cf2975099d40b33cdaeb4768da159060b6f35daf
-
SSDEEP
384:rLptwff1tqGIOfIBTkqS61bPGdrNM1AQk93vmhm7UMKmIEecKdbXTzm9bVhcar6v:/pqffy3LN1A/vMHTi9bD
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1