General
-
Target
https://dropmefiles.net/ru/L7ZAE
-
Sample
250104-maa8ssxkfn
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dropmefiles.net/ru/L7ZAE
Resource
win10ltsc2021-20241211-en
windows10-ltsc 2021-x64
29 signatures
150 seconds
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
hakim32.ddns.net:2000
127.0.0.1:5555
Mutex
7fff0ab4aad436543bdebc87a6cc7f15
Attributes
-
reg_key
7fff0ab4aad436543bdebc87a6cc7f15
-
splitter
|'|'|
Targets
-
-
Target
https://dropmefiles.net/ru/L7ZAE
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1