General
-
Target
57c556e9d91ab8efb7bde8ac3cb90a92f644a037809fe8bb193bfad89e84a11f
-
Size
43KB
-
Sample
241227-113mma1mfj
-
MD5
02d8b0979cac051989fc023728655b29
-
SHA1
482772bab0f677d64dc1f32dada47a170aac2dc7
-
SHA256
57c556e9d91ab8efb7bde8ac3cb90a92f644a037809fe8bb193bfad89e84a11f
-
SHA512
528bab7b98a692c119e2e3d64097452ce9bf111ceb14c43b6441a55c1ffcd1e4a98d403633a703013c4ffee0cebbd08dc970c911b570fe25e32fc757757ea57c
-
SSDEEP
384:RZy9eXN0Vyoy77d6kr9EicEhz5uuzDgIij+ZsNO3PlpJKkkjh/TzF7pWny/greTb:DkEKgl/Qkr9/N1uXQ/o//+L
Behavioral task
behavioral1
Sample
57c556e9d91ab8efb7bde8ac3cb90a92f644a037809fe8bb193bfad89e84a11f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
57c556e9d91ab8efb7bde8ac3cb90a92f644a037809fe8bb193bfad89e84a11f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
status-sue.gl.at.ply.gg:44084
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
57c556e9d91ab8efb7bde8ac3cb90a92f644a037809fe8bb193bfad89e84a11f
-
Size
43KB
-
MD5
02d8b0979cac051989fc023728655b29
-
SHA1
482772bab0f677d64dc1f32dada47a170aac2dc7
-
SHA256
57c556e9d91ab8efb7bde8ac3cb90a92f644a037809fe8bb193bfad89e84a11f
-
SHA512
528bab7b98a692c119e2e3d64097452ce9bf111ceb14c43b6441a55c1ffcd1e4a98d403633a703013c4ffee0cebbd08dc970c911b570fe25e32fc757757ea57c
-
SSDEEP
384:RZy9eXN0Vyoy77d6kr9EicEhz5uuzDgIij+ZsNO3PlpJKkkjh/TzF7pWny/greTb:DkEKgl/Qkr9/N1uXQ/o//+L
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1