Overview
overview
10Static
static
3NjRat Red ...on.exe
windows10-ltsc 2021-x64
10NjRat Red ...am.dll
windows10-ltsc 2021-x64
3NjRat Red ...ch.dll
windows10-ltsc 2021-x64
3NjRat Red ...ic.dll
windows10-ltsc 2021-x64
3NjRat Red ...lg.dll
windows10-ltsc 2021-x64
3NjRat Red ...pw.dll
windows10-ltsc 2021-x64
3NjRat Red ...c2.dll
windows10-ltsc 2021-x64
3NjRat Red ...et.dll
windows10-ltsc 2021-x64
1Analysis
-
max time kernel
96s -
max time network
145s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-01-2025 19:38
Static task
static1
Behavioral task
behavioral1
Sample
NjRat Red Edition/NjRat 0.7D Red Edition.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
NjRat Red Edition/Plugin/cam.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
NjRat Red Edition/Plugin/ch.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
NjRat Red Edition/Plugin/mic.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
NjRat Red Edition/Plugin/plg.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral6
Sample
NjRat Red Edition/Plugin/pw.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral7
Sample
NjRat Red Edition/Plugin/sc2.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral8
Sample
NjRat Red Edition/WinMM.Net.dll
Resource
win10ltsc2021-20250113-en
General
-
Target
NjRat Red Edition/Plugin/ch.dll
-
Size
45KB
-
MD5
2fe4b9dbd31f83faa7aa1c692ba4d3a2
-
SHA1
1b3c03e29302a0f07acb4af306a7ad42ea4827dd
-
SHA256
3c088df7119c494e3df95af42456225f4dab1c3abe003869f8c79afb0993b027
-
SHA512
cd169dc1d2d5cf0f538334b8ac31817ea1a4e2c8c0faca6a715c63eb4aa464e8aaa4f6b10fe030f46a37ab18a1cd6fe099c662c727e107cb87ada1a8218bc5fb
-
SSDEEP
768:FjTkCC7kDA87eqVlviNDkpI/pDwxRcNDRQt40BthZWMaGOQKgB22T:dkCC7kDA87eqVlviNo2hkxmRRQthBt3O
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 2020 4124 rundll32.exe 83 PID 4124 wrote to memory of 2020 4124 rundll32.exe 83 PID 4124 wrote to memory of 2020 4124 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\NjRat Red Edition\Plugin\ch.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\NjRat Red Edition\Plugin\ch.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:2020
-