General
-
Target
b2d090c9279fd27fa992ed729f8aa6311a220358cea1b0f9f72245e2c3ab62dfN.exe
-
Size
23KB
-
Sample
241226-p5qcbawkhs
-
MD5
fb451379d4a930fa6d32653df80f04c0
-
SHA1
5b4415ed12c887fa9654e2020a2cbba35caeb2d5
-
SHA256
b2d090c9279fd27fa992ed729f8aa6311a220358cea1b0f9f72245e2c3ab62df
-
SHA512
845d2979721f37c3d8c3662b74e0ff018d5230e98c1a53fc76ed49e9f17f7bcfc85184d849e8d4e14f6194662b05bfed49d172f9a72a5859e8fef1a1039f42ed
-
SSDEEP
384:D8aY1ia0N/IH+WUiWiLcXyUTly2Rc87po6ngB8W+tqlf5mRvR6JZlbw8hqIusZzW:q1Re/E+WUiW6ci6NR7tZRpcnu/
Behavioral task
behavioral1
Sample
b2d090c9279fd27fa992ed729f8aa6311a220358cea1b0f9f72245e2c3ab62dfN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b2d090c9279fd27fa992ed729f8aa6311a220358cea1b0f9f72245e2c3ab62dfN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
problems-onion.gl.at.ply.gg:37334
626e4dfbf3e3dd60d6fbf80bed03d249
-
reg_key
626e4dfbf3e3dd60d6fbf80bed03d249
-
splitter
|'|'|
Targets
-
-
Target
b2d090c9279fd27fa992ed729f8aa6311a220358cea1b0f9f72245e2c3ab62dfN.exe
-
Size
23KB
-
MD5
fb451379d4a930fa6d32653df80f04c0
-
SHA1
5b4415ed12c887fa9654e2020a2cbba35caeb2d5
-
SHA256
b2d090c9279fd27fa992ed729f8aa6311a220358cea1b0f9f72245e2c3ab62df
-
SHA512
845d2979721f37c3d8c3662b74e0ff018d5230e98c1a53fc76ed49e9f17f7bcfc85184d849e8d4e14f6194662b05bfed49d172f9a72a5859e8fef1a1039f42ed
-
SSDEEP
384:D8aY1ia0N/IH+WUiWiLcXyUTly2Rc87po6ngB8W+tqlf5mRvR6JZlbw8hqIusZzW:q1Re/E+WUiW6ci6NR7tZRpcnu/
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1