General
-
Target
041df349dc08784b924cf4c52af27a3fadf1e751f2a8f30ed9bf2ad13c7748f3.exe
-
Size
43KB
-
Sample
250124-q2xsnasphp
-
MD5
105ab4478b568f39f8e6330f54084571
-
SHA1
5637dcae84aa5797da5490482556c61378c9f1fe
-
SHA256
041df349dc08784b924cf4c52af27a3fadf1e751f2a8f30ed9bf2ad13c7748f3
-
SHA512
7cac14e0709c9c749946227778e131f3e6149124803bf84d592b8c5100809b97e11140cb0410bb541a48b62b332c39df9620e7bf8224da95666d16dc266b3c24
-
SSDEEP
384:bqZyaKVarEvEyeD0brquFENf9QFkznIij+ZsNO3PlpJKkkjh/TzF7pWnamgreT0w:ERKMYvReDwrpWfqNuXQ/ofC+Lg
Behavioral task
behavioral1
Sample
041df349dc08784b924cf4c52af27a3fadf1e751f2a8f30ed9bf2ad13c7748f3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
041df349dc08784b924cf4c52af27a3fadf1e751f2a8f30ed9bf2ad13c7748f3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
192.168.0.11:5552
yandex
-
reg_key
yandex
-
splitter
|Hassan|
Targets
-
-
Target
041df349dc08784b924cf4c52af27a3fadf1e751f2a8f30ed9bf2ad13c7748f3.exe
-
Size
43KB
-
MD5
105ab4478b568f39f8e6330f54084571
-
SHA1
5637dcae84aa5797da5490482556c61378c9f1fe
-
SHA256
041df349dc08784b924cf4c52af27a3fadf1e751f2a8f30ed9bf2ad13c7748f3
-
SHA512
7cac14e0709c9c749946227778e131f3e6149124803bf84d592b8c5100809b97e11140cb0410bb541a48b62b332c39df9620e7bf8224da95666d16dc266b3c24
-
SSDEEP
384:bqZyaKVarEvEyeD0brquFENf9QFkznIij+ZsNO3PlpJKkkjh/TzF7pWnamgreT0w:ERKMYvReDwrpWfqNuXQ/ofC+Lg
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1