General
-
Target
Server.exe
-
Size
43KB
-
Sample
250105-jvvldsxqbv
-
MD5
6dd93ac4471a3c615061219b4cd54da3
-
SHA1
c71064ca536f0cbc633c4e0159b0e72b428ae03a
-
SHA256
74c40e2f13f3919815e98e4c5b6b1a6a34cd3d0f97ca588d56b4a1ae90979342
-
SHA512
4b04187edfd322606b34d61234ab13e836cd063bffcf09b694a1754857f8d14c39673b5660d7097da0a269bc1c54872b67552cf47cc695ca2f21c88d65eefa1f
-
SSDEEP
384:QZyJj+CdsbhKIyKRBxwOIEWrr2z8Iij+ZsNO3PlpJKkkjh/TzF7pWnf/greT0pqP:W2NiwFKDx3ukuXQ/oS/+L
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10ltsc2021-20241211-uk
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
run-julie.gl.at.ply.gg:5550
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
Server.exe
-
Size
43KB
-
MD5
6dd93ac4471a3c615061219b4cd54da3
-
SHA1
c71064ca536f0cbc633c4e0159b0e72b428ae03a
-
SHA256
74c40e2f13f3919815e98e4c5b6b1a6a34cd3d0f97ca588d56b4a1ae90979342
-
SHA512
4b04187edfd322606b34d61234ab13e836cd063bffcf09b694a1754857f8d14c39673b5660d7097da0a269bc1c54872b67552cf47cc695ca2f21c88d65eefa1f
-
SSDEEP
384:QZyJj+CdsbhKIyKRBxwOIEWrr2z8Iij+ZsNO3PlpJKkkjh/TzF7pWnf/greT0pqP:W2NiwFKDx3ukuXQ/oS/+L
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1