General
-
Target
05de7f808bcbd9c8c9bc3620b3bb36faa7f9d1a956223f0ac2579792addb9908.exe
-
Size
115KB
-
Sample
250111-ck56tayldt
-
MD5
90c920a5d1afaebeca9a97a3787928b9
-
SHA1
5bb6c2720cfb1b1792914ac40c24206920e0f5c9
-
SHA256
05de7f808bcbd9c8c9bc3620b3bb36faa7f9d1a956223f0ac2579792addb9908
-
SHA512
db8dc3792e3ca6926790fdd778f92626f93c27699bd108759a6fe20ec79e02e17c8492c592e5aa1ae54bbbcd11b9c3d8d5a30b772b930b488f9eaa62f903e5fd
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RmMo:w5eznsjsguGDFqGx8egoxmO3rRm5
Static task
static1
Behavioral task
behavioral1
Sample
05de7f808bcbd9c8c9bc3620b3bb36faa7f9d1a956223f0ac2579792addb9908.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
05de7f808bcbd9c8c9bc3620b3bb36faa7f9d1a956223f0ac2579792addb9908.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
05de7f808bcbd9c8c9bc3620b3bb36faa7f9d1a956223f0ac2579792addb9908.exe
-
Size
115KB
-
MD5
90c920a5d1afaebeca9a97a3787928b9
-
SHA1
5bb6c2720cfb1b1792914ac40c24206920e0f5c9
-
SHA256
05de7f808bcbd9c8c9bc3620b3bb36faa7f9d1a956223f0ac2579792addb9908
-
SHA512
db8dc3792e3ca6926790fdd778f92626f93c27699bd108759a6fe20ec79e02e17c8492c592e5aa1ae54bbbcd11b9c3d8d5a30b772b930b488f9eaa62f903e5fd
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RmMo:w5eznsjsguGDFqGx8egoxmO3rRm5
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1