General
-
Target
431e12f989dd7a4c9d8235f4fa9f3e026a4b55921aa2fb4942563f857681f06c.exe
-
Size
43KB
-
Sample
241229-cpxp8szjbr
-
MD5
1917739297383bb37d4f159e8540b70b
-
SHA1
12447834e3ce0745f5756f492aee4487c6c1cef4
-
SHA256
431e12f989dd7a4c9d8235f4fa9f3e026a4b55921aa2fb4942563f857681f06c
-
SHA512
7c8b032480dd4e9d972eceb1e1dc354ce5be2c66d777a12a45e267220e5ab601cbfc95d724379a903f59cdc39265a2e62e3d1a9fa66fbe4d8d71c0fa736489c5
-
SSDEEP
384:HZyGdElQ5GoyyBrlr0DiEuEe83H/zIIij+ZsNO3PlpJKkkjh/TzF7pWnI/greT0k:5gmolyBr907NRuXQ/o1/+L
Behavioral task
behavioral1
Sample
431e12f989dd7a4c9d8235f4fa9f3e026a4b55921aa2fb4942563f857681f06c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
431e12f989dd7a4c9d8235f4fa9f3e026a4b55921aa2fb4942563f857681f06c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
2.tcp.eu.ngrok.io:11048
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
431e12f989dd7a4c9d8235f4fa9f3e026a4b55921aa2fb4942563f857681f06c.exe
-
Size
43KB
-
MD5
1917739297383bb37d4f159e8540b70b
-
SHA1
12447834e3ce0745f5756f492aee4487c6c1cef4
-
SHA256
431e12f989dd7a4c9d8235f4fa9f3e026a4b55921aa2fb4942563f857681f06c
-
SHA512
7c8b032480dd4e9d972eceb1e1dc354ce5be2c66d777a12a45e267220e5ab601cbfc95d724379a903f59cdc39265a2e62e3d1a9fa66fbe4d8d71c0fa736489c5
-
SSDEEP
384:HZyGdElQ5GoyyBrlr0DiEuEe83H/zIIij+ZsNO3PlpJKkkjh/TzF7pWnI/greT0k:5gmolyBr907NRuXQ/o1/+L
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1