General
-
Target
a75cc6e666c7810a7c60d0b87f61ea983886227f4ca4de43d2ed8c87d38590dc
-
Size
35KB
-
Sample
241216-b3w57ayqcp
-
MD5
917235e2cc9fb5a974451973b4be23ce
-
SHA1
3f2df07996d988d0bb443bafd75487da428f5389
-
SHA256
a75cc6e666c7810a7c60d0b87f61ea983886227f4ca4de43d2ed8c87d38590dc
-
SHA512
d8f31ed4edd33472a3b0e3967b401688529b2d2e039f66652877a75990b4934808a4ff3d92e2b3c5d9dfabfbba8d17f58f7d3365abd6f9aeb2181c63760144ae
-
SSDEEP
384:pLQ5CVFzG+7OA0VsMEvFO4xQi+yP+hhfMRAQk93vmhm7UMKmIEecKdbXTzm9bVh2:ZIfILxhRA/vMHTi9bDRJk6/i
Behavioral task
behavioral1
Sample
a75cc6e666c7810a7c60d0b87f61ea983886227f4ca4de43d2ed8c87d38590dc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a75cc6e666c7810a7c60d0b87f61ea983886227f4ca4de43d2ed8c87d38590dc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v2.0
HacKed
ratr.zapto.org:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
a75cc6e666c7810a7c60d0b87f61ea983886227f4ca4de43d2ed8c87d38590dc
-
Size
35KB
-
MD5
917235e2cc9fb5a974451973b4be23ce
-
SHA1
3f2df07996d988d0bb443bafd75487da428f5389
-
SHA256
a75cc6e666c7810a7c60d0b87f61ea983886227f4ca4de43d2ed8c87d38590dc
-
SHA512
d8f31ed4edd33472a3b0e3967b401688529b2d2e039f66652877a75990b4934808a4ff3d92e2b3c5d9dfabfbba8d17f58f7d3365abd6f9aeb2181c63760144ae
-
SSDEEP
384:pLQ5CVFzG+7OA0VsMEvFO4xQi+yP+hhfMRAQk93vmhm7UMKmIEecKdbXTzm9bVh2:ZIfILxhRA/vMHTi9bDRJk6/i
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1