General
-
Target
c50c74721a340dfa457152405bb9fcf9bdd725b321510f8eaf2b23c4a68a6abb.exe
-
Size
93KB
-
Sample
250122-d3sh4swlhy
-
MD5
d61b6c8d2031c9c14fd2ca8cac4abbd0
-
SHA1
232a655eb7c720a90d30f4f51a3aa4fde319be2b
-
SHA256
c50c74721a340dfa457152405bb9fcf9bdd725b321510f8eaf2b23c4a68a6abb
-
SHA512
4649981329ec72d555af8888b3bc2b6e93d3569c232247f430147aa32b8f907dc7f1e188f3ec32c5a33fa95cf06f8c3719da033959cb1af709ab4e133a2b3e3a
-
SSDEEP
1536:1emC+xhUa9urgOB9RNvM4jEwzGi1dDlDRgS:1egUa9urgONdGi1dRO
Behavioral task
behavioral1
Sample
c50c74721a340dfa457152405bb9fcf9bdd725b321510f8eaf2b23c4a68a6abb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c50c74721a340dfa457152405bb9fcf9bdd725b321510f8eaf2b23c4a68a6abb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
2.tcp.eu.ngrok.io:17881
a5ecb8dd72f32c83945d9630db93a6c0
-
reg_key
a5ecb8dd72f32c83945d9630db93a6c0
-
splitter
|'|'|
Targets
-
-
Target
c50c74721a340dfa457152405bb9fcf9bdd725b321510f8eaf2b23c4a68a6abb.exe
-
Size
93KB
-
MD5
d61b6c8d2031c9c14fd2ca8cac4abbd0
-
SHA1
232a655eb7c720a90d30f4f51a3aa4fde319be2b
-
SHA256
c50c74721a340dfa457152405bb9fcf9bdd725b321510f8eaf2b23c4a68a6abb
-
SHA512
4649981329ec72d555af8888b3bc2b6e93d3569c232247f430147aa32b8f907dc7f1e188f3ec32c5a33fa95cf06f8c3719da033959cb1af709ab4e133a2b3e3a
-
SSDEEP
1536:1emC+xhUa9urgOB9RNvM4jEwzGi1dDlDRgS:1egUa9urgONdGi1dRO
-
Njrat family
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1