General
-
Target
7256e439e5ff785baeadc6e50ea4963bedab6ae9f905997d7ea66f0890fc58e7.exe
-
Size
23KB
-
Sample
241226-gg5s4axrdy
-
MD5
da1105d020250be0792d3bf21c51dc38
-
SHA1
54249230c23dc70a52450405bbd8ce648c9765eb
-
SHA256
7256e439e5ff785baeadc6e50ea4963bedab6ae9f905997d7ea66f0890fc58e7
-
SHA512
f2b18e924fef4a2a65e1ce399c7ad108d881ddece7272bbd7e5d1f6e93543d0df8ea67948a4aacaa244b0e499a047a91fe36b030f64dc63ab3655f5ec27ac8b9
-
SSDEEP
384:D8aY1ia0N/IH+WUiWiLcXyUTly2Rc87po6ngB8W+tqlf5mRvR6JZlbw8hqIusZzc:q1Re/E+WUiW6ci6NR7tZRpcnu/7
Behavioral task
behavioral1
Sample
7256e439e5ff785baeadc6e50ea4963bedab6ae9f905997d7ea66f0890fc58e7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7256e439e5ff785baeadc6e50ea4963bedab6ae9f905997d7ea66f0890fc58e7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
problems-onion.gl.at.ply.gg:37334
626e4dfbf3e3dd60d6fbf80bed03d249
-
reg_key
626e4dfbf3e3dd60d6fbf80bed03d249
-
splitter
|'|'|
Targets
-
-
Target
7256e439e5ff785baeadc6e50ea4963bedab6ae9f905997d7ea66f0890fc58e7.exe
-
Size
23KB
-
MD5
da1105d020250be0792d3bf21c51dc38
-
SHA1
54249230c23dc70a52450405bbd8ce648c9765eb
-
SHA256
7256e439e5ff785baeadc6e50ea4963bedab6ae9f905997d7ea66f0890fc58e7
-
SHA512
f2b18e924fef4a2a65e1ce399c7ad108d881ddece7272bbd7e5d1f6e93543d0df8ea67948a4aacaa244b0e499a047a91fe36b030f64dc63ab3655f5ec27ac8b9
-
SSDEEP
384:D8aY1ia0N/IH+WUiWiLcXyUTly2Rc87po6ngB8W+tqlf5mRvR6JZlbw8hqIusZzc:q1Re/E+WUiW6ci6NR7tZRpcnu/7
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1