General
-
Target
MoonHub.exe
-
Size
55KB
-
Sample
250115-jt4snsxraq
-
MD5
d33c25da94cb95d1e34f9d22cfd51f99
-
SHA1
b0e82ba0f916dd2e104e612c9a5dc73a96a7b2e1
-
SHA256
f434f44ae7c461b9f88f955cc0977cbf0ae163267b38b5e6ad7989dbcc2d5047
-
SHA512
460d29f349edf87720b4841bbbd5f8c9b63c81b11d893b9625622ef5912e1f6ded6c85fbe2ed670a31788df9eb4c1d149994cc14f23413d62023e51a2b30e5e1
-
SSDEEP
1536:V/pMDnE4uNRty4XzPhhDVwsNMDHXExI3pm+m:rMDnlYk4XdhDVwsNMDHXExI3pm
Behavioral task
behavioral1
Sample
MoonHub.exe
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
nigger
2.tcp.eu.ngrok.io:13018
49a48a7812fddb0d43bb9f70f2221a57
-
reg_key
49a48a7812fddb0d43bb9f70f2221a57
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
MoonHub.exe
-
Size
55KB
-
MD5
d33c25da94cb95d1e34f9d22cfd51f99
-
SHA1
b0e82ba0f916dd2e104e612c9a5dc73a96a7b2e1
-
SHA256
f434f44ae7c461b9f88f955cc0977cbf0ae163267b38b5e6ad7989dbcc2d5047
-
SHA512
460d29f349edf87720b4841bbbd5f8c9b63c81b11d893b9625622ef5912e1f6ded6c85fbe2ed670a31788df9eb4c1d149994cc14f23413d62023e51a2b30e5e1
-
SSDEEP
1536:V/pMDnE4uNRty4XzPhhDVwsNMDHXExI3pm+m:rMDnlYk4XdhDVwsNMDHXExI3pm
-
Modifies WinLogon for persistence
-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
4Pre-OS Boot
1Bootkit
1