General
-
Target
cee7fe6594f75c3c29a6ddf4cfe2ba8b20747c5faed3a9171fc3897e383cd3e0
-
Size
29KB
-
Sample
250123-jgjxqs1kak
-
MD5
a1a937e60363cc1a074d3a28a790d901
-
SHA1
76dfbb0fd9362af83a1079515388079d4b2fa0fd
-
SHA256
cee7fe6594f75c3c29a6ddf4cfe2ba8b20747c5faed3a9171fc3897e383cd3e0
-
SHA512
0d4d8621d78a2c25d79aae93be5719ece952921f658974558ded2b2c8d4d24a05aeab012a5ddd8a7b2d487cb90f9d28801936ed4757fff0a656dbd82efe8939f
-
SSDEEP
384:BaFCtl7Dh+oqIqEXV5HEQTGumqDgN3eH6GBsbh0w4wlAokw9OhgOL1vYRGOZzKZB:P74oqIjlLTAqM3eFBKh0p29SgRcB
Behavioral task
behavioral1
Sample
cee7fe6594f75c3c29a6ddf4cfe2ba8b20747c5faed3a9171fc3897e383cd3e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cee7fe6594f75c3c29a6ddf4cfe2ba8b20747c5faed3a9171fc3897e383cd3e0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.6.4
Hacker
ywsfalsysy.duckdns.org:1177
8b8934ec24fc05c5f20511aa61ac2fa9
-
reg_key
8b8934ec24fc05c5f20511aa61ac2fa9
-
splitter
|'|'|
Targets
-
-
Target
cee7fe6594f75c3c29a6ddf4cfe2ba8b20747c5faed3a9171fc3897e383cd3e0
-
Size
29KB
-
MD5
a1a937e60363cc1a074d3a28a790d901
-
SHA1
76dfbb0fd9362af83a1079515388079d4b2fa0fd
-
SHA256
cee7fe6594f75c3c29a6ddf4cfe2ba8b20747c5faed3a9171fc3897e383cd3e0
-
SHA512
0d4d8621d78a2c25d79aae93be5719ece952921f658974558ded2b2c8d4d24a05aeab012a5ddd8a7b2d487cb90f9d28801936ed4757fff0a656dbd82efe8939f
-
SSDEEP
384:BaFCtl7Dh+oqIqEXV5HEQTGumqDgN3eH6GBsbh0w4wlAokw9OhgOL1vYRGOZzKZB:P74oqIjlLTAqM3eFBKh0p29SgRcB
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1