General
-
Target
fcc63f6536645fe4faaecc064aae5a0bd0afa1f3370acff4c2f812127e2ef168N.exe
-
Size
211KB
-
Sample
250109-ap998asmfq
-
MD5
7aea88442536ff42667f4073e3af7320
-
SHA1
569929fe6d511d8454620ed0c53ece0bcbddd116
-
SHA256
fcc63f6536645fe4faaecc064aae5a0bd0afa1f3370acff4c2f812127e2ef168
-
SHA512
6f7e3ca91a87fd431f3b5e03fdea7ffcf31ca09ba108d4bb593e90acf76058b07e2c06b1197ebde07ceed4ee3fe0ce03cda55dcf8e43a6936b874282f3bb4993
-
SSDEEP
3072:K80GK5/RPJTOSE1wIVNLIUFQbu21XxjVepW:KfhRPJaSgNsHbu2rj8
Static task
static1
Behavioral task
behavioral1
Sample
fcc63f6536645fe4faaecc064aae5a0bd0afa1f3370acff4c2f812127e2ef168N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fcc63f6536645fe4faaecc064aae5a0bd0afa1f3370acff4c2f812127e2ef168N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
yasser
yassser.no-ip.org:5552
32d2362b7a87fb7b318b9b923d0d0515
-
reg_key
32d2362b7a87fb7b318b9b923d0d0515
-
splitter
|'|'|
Targets
-
-
Target
fcc63f6536645fe4faaecc064aae5a0bd0afa1f3370acff4c2f812127e2ef168N.exe
-
Size
211KB
-
MD5
7aea88442536ff42667f4073e3af7320
-
SHA1
569929fe6d511d8454620ed0c53ece0bcbddd116
-
SHA256
fcc63f6536645fe4faaecc064aae5a0bd0afa1f3370acff4c2f812127e2ef168
-
SHA512
6f7e3ca91a87fd431f3b5e03fdea7ffcf31ca09ba108d4bb593e90acf76058b07e2c06b1197ebde07ceed4ee3fe0ce03cda55dcf8e43a6936b874282f3bb4993
-
SSDEEP
3072:K80GK5/RPJTOSE1wIVNLIUFQbu21XxjVepW:KfhRPJaSgNsHbu2rj8
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1