General
-
Target
c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832N.exe
-
Size
172KB
-
Sample
241231-b626lszret
-
MD5
261848a51883c136a6c377f9e3829e70
-
SHA1
64280ed890cb9fe4d241626f85e8e02a59c04973
-
SHA256
c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832
-
SHA512
b74c7a2f8142703bbd2717faf5222dd8caf9adb22b9e54124bbe3e0e61eeeca849f730cdccd616572868c0e3ea3c79181ef6a5d8aee1dfc48e9642b582ba44ef
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalR5n93273/+yJKi:UsLqdufVUNDa9932aA
Behavioral task
behavioral1
Sample
c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832N.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
im523
pakEt
condition-clearance.gl.at.ply.gg:7070
9d3a575fdcc2dd1782d18ac5655a8b28
-
reg_key
9d3a575fdcc2dd1782d18ac5655a8b28
-
splitter
|'|'|
Targets
-
-
Target
c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832N.exe
-
Size
172KB
-
MD5
261848a51883c136a6c377f9e3829e70
-
SHA1
64280ed890cb9fe4d241626f85e8e02a59c04973
-
SHA256
c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832
-
SHA512
b74c7a2f8142703bbd2717faf5222dd8caf9adb22b9e54124bbe3e0e61eeeca849f730cdccd616572868c0e3ea3c79181ef6a5d8aee1dfc48e9642b582ba44ef
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalR5n93273/+yJKi:UsLqdufVUNDa9932aA
-
Modifies visiblity of hidden/system files in Explorer
-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2