General
-
Target
b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6
-
Size
37KB
-
Sample
250101-cs4b7a1kgs
-
MD5
ebd4a0747e8663cb885cf2b86153352d
-
SHA1
ac610e0e9d8d36153c87f24e11a8080e3edadcd9
-
SHA256
b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6
-
SHA512
54946f3d035ed6b8081e9329cc612ef3c048e593a28ef083095a2232c757a94b9b204bb34982e2287912742accee42d22f201f6db8855e15245ebceb5f366ab0
-
SSDEEP
384:5eL8CT0i9NdTe/kCOyU7NuvLmDPM+CrAF+rMRTyN/0L+EcoinblneHQM3epzXeNX:QLhT1CFU7NuKbMdrM+rMRa8Nu4Ht
Behavioral task
behavioral1
Sample
b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
127.0.0.1:7326
41563bca2271dd5d1babb5367aececa5
-
reg_key
41563bca2271dd5d1babb5367aececa5
-
splitter
|'|'|
Targets
-
-
Target
b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6
-
Size
37KB
-
MD5
ebd4a0747e8663cb885cf2b86153352d
-
SHA1
ac610e0e9d8d36153c87f24e11a8080e3edadcd9
-
SHA256
b69d7bdd0b4ac0d7ff38bd89b0f461794a5daa767ce395e6428c5a03e01831f6
-
SHA512
54946f3d035ed6b8081e9329cc612ef3c048e593a28ef083095a2232c757a94b9b204bb34982e2287912742accee42d22f201f6db8855e15245ebceb5f366ab0
-
SSDEEP
384:5eL8CT0i9NdTe/kCOyU7NuvLmDPM+CrAF+rMRTyN/0L+EcoinblneHQM3epzXeNX:QLhT1CFU7NuKbMdrM+rMRa8Nu4Ht
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1