General
-
Target
677b2f3d4275232db4c9a7e86a96598f640a540224e03fd7a89075cfabbea37dN.exe
-
Size
51KB
-
Sample
250111-bsyw2axjbv
-
MD5
e3f19a6d4a100b9cc3e59f7974e352d0
-
SHA1
d12880e3a383f2fb530015fbf8b23f3b3d8e9cd4
-
SHA256
677b2f3d4275232db4c9a7e86a96598f640a540224e03fd7a89075cfabbea37d
-
SHA512
2096527f199524b5baad0f2b91b5d9dd30827e691f28152b60065e6a21d504a2bfba3fa929a26c66b869a15d783066e8f4c418093c3784c5fda6835cec64e5a5
-
SSDEEP
768:uFN5WpszMFsmjv0yrM+rMRa8NuLatrNgpWO:uFN5W+AFsmjst+gRJNEQu
Behavioral task
behavioral1
Sample
677b2f3d4275232db4c9a7e86a96598f640a540224e03fd7a89075cfabbea37dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
677b2f3d4275232db4c9a7e86a96598f640a540224e03fd7a89075cfabbea37dN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
Pisun
192.168.8.1:2192
4f17247515ce6a71ea4fca5b97bbccaa
-
reg_key
4f17247515ce6a71ea4fca5b97bbccaa
-
splitter
|'|'|
Targets
-
-
Target
677b2f3d4275232db4c9a7e86a96598f640a540224e03fd7a89075cfabbea37dN.exe
-
Size
51KB
-
MD5
e3f19a6d4a100b9cc3e59f7974e352d0
-
SHA1
d12880e3a383f2fb530015fbf8b23f3b3d8e9cd4
-
SHA256
677b2f3d4275232db4c9a7e86a96598f640a540224e03fd7a89075cfabbea37d
-
SHA512
2096527f199524b5baad0f2b91b5d9dd30827e691f28152b60065e6a21d504a2bfba3fa929a26c66b869a15d783066e8f4c418093c3784c5fda6835cec64e5a5
-
SSDEEP
768:uFN5WpszMFsmjv0yrM+rMRa8NuLatrNgpWO:uFN5W+AFsmjst+gRJNEQu
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1