General
-
Target
Setup.exe
-
Size
37KB
-
Sample
250110-sc5hbazpbr
-
MD5
e3383ba53ecebb2ecb7063fcccff17dc
-
SHA1
cd1384e86f194f95c8939418d30c80c56c412645
-
SHA256
07eaa040d73e39f53851533c8c09d92cd3228d099236e3995b19b4c8a1c15ada
-
SHA512
563f952147c529230824ae6feaababb3ccbe7eca324d71892d2d4f68ffc0eb6eaf1edce29662c63563cd1f7c6de6e4468b35e2b96a7eb43c93aa7367c2877d34
-
SSDEEP
384:LpRWUiDZblmJEpRGyEff1PNN0CYSmkhrAF+rMRTyN/0L+EcoinblneHQM3epzXPL:9R6HpR9Eff1P0Clm8rM+rMRa8NuxZt
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
3.121.113.182:1337
0cf848bcebf5d082d484e0ffe1e8f23e
-
reg_key
0cf848bcebf5d082d484e0ffe1e8f23e
-
splitter
|'|'|
Targets
-
-
Target
Setup.exe
-
Size
37KB
-
MD5
e3383ba53ecebb2ecb7063fcccff17dc
-
SHA1
cd1384e86f194f95c8939418d30c80c56c412645
-
SHA256
07eaa040d73e39f53851533c8c09d92cd3228d099236e3995b19b4c8a1c15ada
-
SHA512
563f952147c529230824ae6feaababb3ccbe7eca324d71892d2d4f68ffc0eb6eaf1edce29662c63563cd1f7c6de6e4468b35e2b96a7eb43c93aa7367c2877d34
-
SSDEEP
384:LpRWUiDZblmJEpRGyEff1PNN0CYSmkhrAF+rMRTyN/0L+EcoinblneHQM3epzXPL:9R6HpR9Eff1P0Clm8rM+rMRa8NuxZt
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1