General
-
Target
a8013df3e7b4242e09d9eda816623ed6f810c7f8f244a862c09d6642e4dcdb5c
-
Size
26KB
-
Sample
250121-j9rs2svmcn
-
MD5
5230ab034bd4b7c980a35c06b4080b1a
-
SHA1
a0c1db997607da4489d20380ee7b3acf03ace7c4
-
SHA256
a8013df3e7b4242e09d9eda816623ed6f810c7f8f244a862c09d6642e4dcdb5c
-
SHA512
e1e11609bb875d6acbb979efd64e7de69b13852e39f3f3b1d95443f2827f9a55d8476a599a1e45cf3e04f21f0ba02a55a16cc64c18392609d4265b292c6a84d9
-
SSDEEP
384:yLjM2XwBNOaLNOFM/Av2yeCP1BBvMl7AQk93vmhm7UMKmIEecKdbXTzm9bVhcayX:sw220U0Wl7A/vMHTi9bD
Behavioral task
behavioral1
Sample
a8013df3e7b4242e09d9eda816623ed6f810c7f8f244a862c09d6642e4dcdb5c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a8013df3e7b4242e09d9eda816623ed6f810c7f8f244a862c09d6642e4dcdb5c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v2.0
HacKed
itsdrvgon1.ddns.net:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
a8013df3e7b4242e09d9eda816623ed6f810c7f8f244a862c09d6642e4dcdb5c
-
Size
26KB
-
MD5
5230ab034bd4b7c980a35c06b4080b1a
-
SHA1
a0c1db997607da4489d20380ee7b3acf03ace7c4
-
SHA256
a8013df3e7b4242e09d9eda816623ed6f810c7f8f244a862c09d6642e4dcdb5c
-
SHA512
e1e11609bb875d6acbb979efd64e7de69b13852e39f3f3b1d95443f2827f9a55d8476a599a1e45cf3e04f21f0ba02a55a16cc64c18392609d4265b292c6a84d9
-
SSDEEP
384:yLjM2XwBNOaLNOFM/Av2yeCP1BBvMl7AQk93vmhm7UMKmIEecKdbXTzm9bVhcayX:sw220U0Wl7A/vMHTi9bD
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1