General
-
Target
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe
-
Size
172KB
-
Sample
241230-3s3zjaxmfz
-
MD5
615e7480ad72e1972fc90fbb1fa23bb0
-
SHA1
aec002a1465c11efcf492273bee97a22c8b6fa77
-
SHA256
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333d
-
SHA512
8d223c74d73d83a093bfdbbf5c5a94c2326a022750ff4b55b0a95156d8098de57444a4efbbb09762cae12c002fbe953a3361014431440230307228c3c70e1b19
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalRFvh4Bge+yJYL:UsLqdufVUNDaBh4GH
Behavioral task
behavioral1
Sample
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
im523
HacKed
learn-rage.gl.at.ply.gg:27556
e456603c650484e45e47269f670d15a9
-
reg_key
e456603c650484e45e47269f670d15a9
-
splitter
|'|'|
Targets
-
-
Target
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe
-
Size
172KB
-
MD5
615e7480ad72e1972fc90fbb1fa23bb0
-
SHA1
aec002a1465c11efcf492273bee97a22c8b6fa77
-
SHA256
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333d
-
SHA512
8d223c74d73d83a093bfdbbf5c5a94c2326a022750ff4b55b0a95156d8098de57444a4efbbb09762cae12c002fbe953a3361014431440230307228c3c70e1b19
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalRFvh4Bge+yJYL:UsLqdufVUNDaBh4GH
-
Modifies visiblity of hidden/system files in Explorer
-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2