Overview
overview
10Static
static
3NjRat Red ...on.exe
windows10-ltsc 2021-x64
10NjRat Red ...am.dll
windows10-ltsc 2021-x64
3NjRat Red ...ch.dll
windows10-ltsc 2021-x64
3NjRat Red ...ic.dll
windows10-ltsc 2021-x64
3NjRat Red ...lg.dll
windows10-ltsc 2021-x64
3NjRat Red ...pw.dll
windows10-ltsc 2021-x64
3NjRat Red ...c2.dll
windows10-ltsc 2021-x64
3NjRat Red ...et.dll
windows10-ltsc 2021-x64
1Analysis
-
max time kernel
98s -
max time network
140s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-01-2025 19:38
Static task
static1
Behavioral task
behavioral1
Sample
NjRat Red Edition/NjRat 0.7D Red Edition.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
NjRat Red Edition/Plugin/cam.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
NjRat Red Edition/Plugin/ch.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
NjRat Red Edition/Plugin/mic.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
NjRat Red Edition/Plugin/plg.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral6
Sample
NjRat Red Edition/Plugin/pw.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral7
Sample
NjRat Red Edition/Plugin/sc2.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral8
Sample
NjRat Red Edition/WinMM.Net.dll
Resource
win10ltsc2021-20250113-en
General
-
Target
NjRat Red Edition/Plugin/sc2.dll
-
Size
46KB
-
MD5
2d65bc3bff4a5d31b59f5bdf6e6311d7
-
SHA1
43962fbeb93fc267fb1c7036a12b8c5d6f40c28a
-
SHA256
010b1ec566be774a2d12146f9826aa31fd7eb6ffe7b45ce5e572b2d8c7f815c3
-
SHA512
b210d447cc9b4b89402a2a1d3d5e9cfe13ae897c47094be4110ed3aac109152c8a45ec138f73b703e7d3799934234cba4ca3f2439b3dd193a4cec671b9edaa6a
-
SSDEEP
768:mtAX1G0UYRxIDbYDGN5/eoK79QlRfe2AfgFTMBku2T:mtAFZUYA/uW2x9CJe2BFQB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1288 1996 rundll32.exe 83 PID 1996 wrote to memory of 1288 1996 rundll32.exe 83 PID 1996 wrote to memory of 1288 1996 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\NjRat Red Edition\Plugin\sc2.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\NjRat Red Edition\Plugin\sc2.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:1288
-