General
-
Target
9fda1a08e9333196ddcce35ba341a1c4de4656075fe0842fa99acd0c1be20945
-
Size
22KB
-
Sample
250114-xs95yswnct
-
MD5
9a8917da9033a8b24506acc1d15f4a9b
-
SHA1
080507306fec6b87cf8223087417f480ad4f03e7
-
SHA256
9fda1a08e9333196ddcce35ba341a1c4de4656075fe0842fa99acd0c1be20945
-
SHA512
f693ad71d77267d9879dae88ae3ae8a682686cbc60455e0fd06653653cf1d8250bc081744a49bd937b21134ea719d2148c4e187eb8a5ac04e0c23c431bf3477e
-
SSDEEP
384:M9+n2650N3qZbATcjRGC5EowD46BgnqUhay19mRvR6JZlbw8hqIusZzZzr:Mim+71d5ARpcnuQ
Behavioral task
behavioral1
Sample
9fda1a08e9333196ddcce35ba341a1c4de4656075fe0842fa99acd0c1be20945.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9fda1a08e9333196ddcce35ba341a1c4de4656075fe0842fa99acd0c1be20945.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
bypassmm
127.0.0.1:3158
7d3bf60db30b800b77fa3aa9ed9ed5c8
-
reg_key
7d3bf60db30b800b77fa3aa9ed9ed5c8
-
splitter
|'|'|
Targets
-
-
Target
9fda1a08e9333196ddcce35ba341a1c4de4656075fe0842fa99acd0c1be20945
-
Size
22KB
-
MD5
9a8917da9033a8b24506acc1d15f4a9b
-
SHA1
080507306fec6b87cf8223087417f480ad4f03e7
-
SHA256
9fda1a08e9333196ddcce35ba341a1c4de4656075fe0842fa99acd0c1be20945
-
SHA512
f693ad71d77267d9879dae88ae3ae8a682686cbc60455e0fd06653653cf1d8250bc081744a49bd937b21134ea719d2148c4e187eb8a5ac04e0c23c431bf3477e
-
SSDEEP
384:M9+n2650N3qZbATcjRGC5EowD46BgnqUhay19mRvR6JZlbw8hqIusZzZzr:Mim+71d5ARpcnuQ
-
Njrat family
-
Modifies Windows Firewall
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1