General
-
Target
071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe
-
Size
64KB
-
Sample
250201-ysw4rsxqfx
-
MD5
25e50be90bfd526318a41296bfb5b650
-
SHA1
9a57776f4110fda99adb8e7e86797d6caf96dc7f
-
SHA256
071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92
-
SHA512
c187fb49605ba2c9c4a6ca2c68dc6c263ae26552a2fdf00bc6cd508f01abc8526741171ea6c80aca2c9ed5665c734a7cb21d210e5429801e71773ed20701682e
-
SSDEEP
1536:3EFRfIIajeMzBdiGN9BbwNLi2bhtbxnCAumX:4RfIIYnbONVv5CAFX
Static task
static1
Behavioral task
behavioral1
Sample
071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
0.6.4
HacKed
127.0.0.1:1177
41180d06ba79ca0eb6f0d961bf964eef
-
reg_key
41180d06ba79ca0eb6f0d961bf964eef
-
splitter
|'|'|
Targets
-
-
Target
071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92N.exe
-
Size
64KB
-
MD5
25e50be90bfd526318a41296bfb5b650
-
SHA1
9a57776f4110fda99adb8e7e86797d6caf96dc7f
-
SHA256
071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92
-
SHA512
c187fb49605ba2c9c4a6ca2c68dc6c263ae26552a2fdf00bc6cd508f01abc8526741171ea6c80aca2c9ed5665c734a7cb21d210e5429801e71773ed20701682e
-
SSDEEP
1536:3EFRfIIajeMzBdiGN9BbwNLi2bhtbxnCAumX:4RfIIYnbONVv5CAFX
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1