General
-
Target
Server.exe
-
Size
43KB
-
Sample
250105-jsglraxpfv
-
MD5
3b426fddedbb6f2ba8debc7eefe1ffb0
-
SHA1
8e69d401eb75f78de701954d595156826d324a7e
-
SHA256
17d0bef5296fdef3bca0bee36e09baf19e258c6290f41849c3a92132d0cf54d3
-
SHA512
2edb6201132390d985f4e1c1f476cb0de02dba05d826f2087c77b8f577a84ad59a787f46c0a40a01f10a8073cda052e5d9071474248c71cb8bc75358a323d8d4
-
SSDEEP
384:YZyJj+CdsbhKIyKRBxwOIEWrr2z8Iij+ZsNO3PlpJKkkjh/TzF7pWnvW/greT0pu:u2NiwFKDx3ukuXQ/oCW/+L
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win11-20241007-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
run-julie.gl.at.ply.gg:56057
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
Server.exe
-
Size
43KB
-
MD5
3b426fddedbb6f2ba8debc7eefe1ffb0
-
SHA1
8e69d401eb75f78de701954d595156826d324a7e
-
SHA256
17d0bef5296fdef3bca0bee36e09baf19e258c6290f41849c3a92132d0cf54d3
-
SHA512
2edb6201132390d985f4e1c1f476cb0de02dba05d826f2087c77b8f577a84ad59a787f46c0a40a01f10a8073cda052e5d9071474248c71cb8bc75358a323d8d4
-
SSDEEP
384:YZyJj+CdsbhKIyKRBxwOIEWrr2z8Iij+ZsNO3PlpJKkkjh/TzF7pWnvW/greT0pu:u2NiwFKDx3ukuXQ/oCW/+L
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1