General
-
Target
4ce4a034024c108c1ec4c38bc0235f3ab94b5f308199a5c60e3cd706bfb46854
-
Size
183KB
-
Sample
250127-14wngsxlby
-
MD5
0b786d749488d1dbce96ba6d70b81afb
-
SHA1
73d338f2788538fc3e082c0bcfda073bccb6c304
-
SHA256
4ce4a034024c108c1ec4c38bc0235f3ab94b5f308199a5c60e3cd706bfb46854
-
SHA512
a2e6478902481aba53f1cc6bd344c55aefc96d880939d33f8a91731983b329392ef75b7e11886809c5321e3e1176484bdd04e96eebd5f7021ba3a705f0f70585
-
SSDEEP
3072:kmh7/CUBBSUb4XVkF4HGaBEl6OygXlL2RFQoP7JmKWNFTkEt8QXrQQck+/lFOjzP:kmhbCdM4mMgR2RaKWfj8QXrAlMgM
Static task
static1
Behavioral task
behavioral1
Sample
4ce4a034024c108c1ec4c38bc0235f3ab94b5f308199a5c60e3cd706bfb46854.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4ce4a034024c108c1ec4c38bc0235f3ab94b5f308199a5c60e3cd706bfb46854.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
kkttyy.kro.kr:2859
d059b6aa76c2da376867aa3188bcd31f
-
reg_key
d059b6aa76c2da376867aa3188bcd31f
-
splitter
|'|'|
Targets
-
-
Target
4ce4a034024c108c1ec4c38bc0235f3ab94b5f308199a5c60e3cd706bfb46854
-
Size
183KB
-
MD5
0b786d749488d1dbce96ba6d70b81afb
-
SHA1
73d338f2788538fc3e082c0bcfda073bccb6c304
-
SHA256
4ce4a034024c108c1ec4c38bc0235f3ab94b5f308199a5c60e3cd706bfb46854
-
SHA512
a2e6478902481aba53f1cc6bd344c55aefc96d880939d33f8a91731983b329392ef75b7e11886809c5321e3e1176484bdd04e96eebd5f7021ba3a705f0f70585
-
SSDEEP
3072:kmh7/CUBBSUb4XVkF4HGaBEl6OygXlL2RFQoP7JmKWNFTkEt8QXrQQck+/lFOjzP:kmhbCdM4mMgR2RaKWfj8QXrAlMgM
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1