General
-
Target
4424007959b17acbbc6899984ac379acfd778ab4bfd5d3237eef1ed493500cc5.exe
-
Size
37KB
-
Sample
250124-plpxfazlar
-
MD5
2932f7a56fce9ae83b2984f787ed0dc9
-
SHA1
5482a21a86c1222a7cd7a8bf7526f46b1201658a
-
SHA256
4424007959b17acbbc6899984ac379acfd778ab4bfd5d3237eef1ed493500cc5
-
SHA512
477c21cb5bfb3cdd56405b925710e253df7979825f4825cff94d8274c4441cd7477441ab8f541d0f96e05fff55a77b2c5abc5928c6aede8e06ef12b98d6324af
-
SSDEEP
384:hEigUiDrblmJEpRGyEfdDPTuWCYqAEkJhrAF+rMRTyN/0L+EcoinblneHQM3epzK:GiyHpR9EfdDCWClALhrM+rMRa8NuMRtr
Behavioral task
behavioral1
Sample
4424007959b17acbbc6899984ac379acfd778ab4bfd5d3237eef1ed493500cc5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4424007959b17acbbc6899984ac379acfd778ab4bfd5d3237eef1ed493500cc5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
csrs
veronicafola.ddns.net:1177
6ba8ee6e8614f76eb58d1f68854d467b
-
reg_key
6ba8ee6e8614f76eb58d1f68854d467b
-
splitter
|'|'|
Targets
-
-
Target
4424007959b17acbbc6899984ac379acfd778ab4bfd5d3237eef1ed493500cc5.exe
-
Size
37KB
-
MD5
2932f7a56fce9ae83b2984f787ed0dc9
-
SHA1
5482a21a86c1222a7cd7a8bf7526f46b1201658a
-
SHA256
4424007959b17acbbc6899984ac379acfd778ab4bfd5d3237eef1ed493500cc5
-
SHA512
477c21cb5bfb3cdd56405b925710e253df7979825f4825cff94d8274c4441cd7477441ab8f541d0f96e05fff55a77b2c5abc5928c6aede8e06ef12b98d6324af
-
SSDEEP
384:hEigUiDrblmJEpRGyEfdDPTuWCYqAEkJhrAF+rMRTyN/0L+EcoinblneHQM3epzK:GiyHpR9EfdDCWClALhrM+rMRa8NuMRtr
-
Njrat family
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1