General
-
Target
6dfe16f82116f1537efcac4f015247d28339062bcbaa7fc75c9486caa76a9d0d.exe
-
Size
93KB
-
Sample
250113-cwpm7stnfr
-
MD5
1ed0c2e213e674c8a95694c9e19361c7
-
SHA1
05446e3404b3171264fc344bf4013eb8ea2cf740
-
SHA256
6dfe16f82116f1537efcac4f015247d28339062bcbaa7fc75c9486caa76a9d0d
-
SHA512
381fd14b550674d0214d75d203264947078d874afa91122bfad5fb96c3a523fddf1dccd6c69e46c6590ca1ab9025a647e253188e7b9927f0baab8bb199c1d9c7
-
SSDEEP
768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
Behavioral task
behavioral1
Sample
6dfe16f82116f1537efcac4f015247d28339062bcbaa7fc75c9486caa76a9d0d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
6dfe16f82116f1537efcac4f015247d28339062bcbaa7fc75c9486caa76a9d0d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
debil
hakim32.ddns.net:2000
178.215.236.227:4411
364d88128926b2e822553333b20c197f
-
reg_key
364d88128926b2e822553333b20c197f
-
splitter
|'|'|
Targets
-
-
Target
6dfe16f82116f1537efcac4f015247d28339062bcbaa7fc75c9486caa76a9d0d.exe
-
Size
93KB
-
MD5
1ed0c2e213e674c8a95694c9e19361c7
-
SHA1
05446e3404b3171264fc344bf4013eb8ea2cf740
-
SHA256
6dfe16f82116f1537efcac4f015247d28339062bcbaa7fc75c9486caa76a9d0d
-
SHA512
381fd14b550674d0214d75d203264947078d874afa91122bfad5fb96c3a523fddf1dccd6c69e46c6590ca1ab9025a647e253188e7b9927f0baab8bb199c1d9c7
-
SSDEEP
768:/Y34G/jglPPMJI08+EyrERm9hX+JlwA461mXxrjEtCdnl2pi1Rz4Rk3qsGdpYgS7:RG7gdQ8+f4mXpA4tjEwzGi1dDGDYgS
-
Njrat family
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1