General
-
Target
Nursultan.bat
-
Size
93KB
-
Sample
241220-rglekaxkc1
-
MD5
73c7a3c03ab43cd390c64e04374c43d9
-
SHA1
661c1d5642647432a69c1471803a007592b16543
-
SHA256
8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9
-
SHA512
2cd13500928ce9179b5c8ddec0c5e07713754e8e8665f973e4006a374e210aa30c5bb5763807dc91d22cf89952f4a7ca6eda992ac3bfae684b3cf7754e087b0c
-
SSDEEP
1536:axGq+8Tnc7iXQj5piFejEwzGi1dDIDngS:axXTnkiXE4Vi1dOg
Behavioral task
behavioral1
Sample
Nursultan.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Nursultan.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:5552
20b7dddd28527b3a08b870ea6749495d
-
reg_key
20b7dddd28527b3a08b870ea6749495d
-
splitter
|'|'|
Targets
-
-
Target
Nursultan.bat
-
Size
93KB
-
MD5
73c7a3c03ab43cd390c64e04374c43d9
-
SHA1
661c1d5642647432a69c1471803a007592b16543
-
SHA256
8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9
-
SHA512
2cd13500928ce9179b5c8ddec0c5e07713754e8e8665f973e4006a374e210aa30c5bb5763807dc91d22cf89952f4a7ca6eda992ac3bfae684b3cf7754e087b0c
-
SSDEEP
1536:axGq+8Tnc7iXQj5piFejEwzGi1dDIDngS:axXTnkiXE4Vi1dOg
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1