General
-
Target
Hazem pro.exe
-
Size
1.3MB
-
Sample
250114-mcwyaaxmhp
-
MD5
9d399494a5edab7861687db8301165ee
-
SHA1
939172bd2056b077375daf57bdc3227688c0174f
-
SHA256
21a76a566962c21072555e4bb5121349968ca8e5a4a459b8c628f50be8edb549
-
SHA512
b4c66b06ddd3b3dd759643769b062f6f021204d7ab6e7605da9d8ba92e62664a672e2f79cbbdb0ac120bf89f30b717cb6920dfa9ca170dd7c7000c47553f916c
-
SSDEEP
24576:Pnzkt2a4f25l9otyOiAifrtx5V3S7KS9ZIUK5HKeKYjFXXTmVGWVRDnORAQ7iE:ryW+5otyOaDtx5V3VS/hK5qleXXTmL3k
Static task
static1
Behavioral task
behavioral1
Sample
Hazem pro.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
Hazem pro.exe
Resource
win11-20241007-en
Malware Config
Extracted
njrat
im523
تم الاختراق بواسطا احمد السيسي
maestro49.ddns.net:5552
5f137ae7d0d66d9b5cded8a570234747
-
reg_key
5f137ae7d0d66d9b5cded8a570234747
-
splitter
|'|'|
Targets
-
-
Target
Hazem pro.exe
-
Size
1.3MB
-
MD5
9d399494a5edab7861687db8301165ee
-
SHA1
939172bd2056b077375daf57bdc3227688c0174f
-
SHA256
21a76a566962c21072555e4bb5121349968ca8e5a4a459b8c628f50be8edb549
-
SHA512
b4c66b06ddd3b3dd759643769b062f6f021204d7ab6e7605da9d8ba92e62664a672e2f79cbbdb0ac120bf89f30b717cb6920dfa9ca170dd7c7000c47553f916c
-
SSDEEP
24576:Pnzkt2a4f25l9otyOiAifrtx5V3S7KS9ZIUK5HKeKYjFXXTmVGWVRDnORAQ7iE:ryW+5otyOaDtx5V3VS/hK5qleXXTmL3k
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1