General
-
Target
system.exe
-
Size
23KB
-
Sample
241216-g26wwsxqgw
-
MD5
e170c80d53dfec6413f3bb13cf2505b8
-
SHA1
32d0c64ac85166bf71a9f24ea091f470c5b471b9
-
SHA256
bb8065309db684a81570b42a0bb4b0b160fea37eb4117d9296fccb678ea5ec2e
-
SHA512
2926bb37d421cde19653b8b4f0e78469fc415f2d4f8b0b3072728e1a1b70d62d88dec1a2b7affa413631ae0c242ed1e4fe0ca137f5cdf0abee5fd7a07525541c
-
SSDEEP
384:N8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ0U:uXcwt3tRpcnuq
Behavioral task
behavioral1
Sample
system.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
system.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
feacebook.us.to:4444
09a96e8bdcc22f9e796248ee9591454a
-
reg_key
09a96e8bdcc22f9e796248ee9591454a
-
splitter
|'|'|
Targets
-
-
Target
system.exe
-
Size
23KB
-
MD5
e170c80d53dfec6413f3bb13cf2505b8
-
SHA1
32d0c64ac85166bf71a9f24ea091f470c5b471b9
-
SHA256
bb8065309db684a81570b42a0bb4b0b160fea37eb4117d9296fccb678ea5ec2e
-
SHA512
2926bb37d421cde19653b8b4f0e78469fc415f2d4f8b0b3072728e1a1b70d62d88dec1a2b7affa413631ae0c242ed1e4fe0ca137f5cdf0abee5fd7a07525541c
-
SSDEEP
384:N8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ0U:uXcwt3tRpcnuq
-
Njrat family
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1