General
-
Target
36c8bb2585ecb14b32a35a62bdb32895515328a9f4768dc4876bad3c9f0666bcN.exe
-
Size
43KB
-
Sample
250124-m84yrswrdk
-
MD5
b1283fbe4ed44ab1d1933fb2976a1aa0
-
SHA1
c344656fd10baa86224e3da852ffd37293a8882b
-
SHA256
36c8bb2585ecb14b32a35a62bdb32895515328a9f4768dc4876bad3c9f0666bc
-
SHA512
4d5972c134d7b148509a7ff6e27edd118377e9647b47ca569fb8244b79fde441b0d3bdd645fd804d1e1fccf3ef4f16658becbf1a29719fc3182283332faeafa5
-
SSDEEP
384:bqZyaKVarEvEyeD0brquFENf9QFkznIij+ZsNO3PlpJKkkjh/TzF7pWnamgreT0k:ERKMYvReDwrpWfqNuXQ/ofC+L
Behavioral task
behavioral1
Sample
36c8bb2585ecb14b32a35a62bdb32895515328a9f4768dc4876bad3c9f0666bcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36c8bb2585ecb14b32a35a62bdb32895515328a9f4768dc4876bad3c9f0666bcN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
192.168.0.11:5552
yandex
-
reg_key
yandex
-
splitter
|Hassan|
Targets
-
-
Target
36c8bb2585ecb14b32a35a62bdb32895515328a9f4768dc4876bad3c9f0666bcN.exe
-
Size
43KB
-
MD5
b1283fbe4ed44ab1d1933fb2976a1aa0
-
SHA1
c344656fd10baa86224e3da852ffd37293a8882b
-
SHA256
36c8bb2585ecb14b32a35a62bdb32895515328a9f4768dc4876bad3c9f0666bc
-
SHA512
4d5972c134d7b148509a7ff6e27edd118377e9647b47ca569fb8244b79fde441b0d3bdd645fd804d1e1fccf3ef4f16658becbf1a29719fc3182283332faeafa5
-
SSDEEP
384:bqZyaKVarEvEyeD0brquFENf9QFkznIij+ZsNO3PlpJKkkjh/TzF7pWnamgreT0k:ERKMYvReDwrpWfqNuXQ/ofC+L
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1