General
-
Target
4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b
-
Size
564KB
-
Sample
250207-z6e8vazkar
-
MD5
c709aa33c0165cebde24123555769a7a
-
SHA1
ad4813cd0461fbdbc7265dc7880e22978ffc7b54
-
SHA256
4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b
-
SHA512
ccd0ffc52ed12a4f2e74a0aef982dbd67b271412102e2373e07f24142560e0a0006d60166b1ba789bbb8745067c2d50e3e822f3355bdff2c52d22444151ab7eb
-
SSDEEP
12288:6yB0aI78IV40HioBu3yCeOr0rS6KsXr7ieWCU:BB07EyCTr0rFf7aC
Static task
static1
Behavioral task
behavioral1
Sample
4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
njrat
0.7d
HacKed
cpanel.hackcrack.io:2222
Windows Explorer
-
reg_key
Windows Explorer
-
splitter
|'|'|
Targets
-
-
Target
4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b
-
Size
564KB
-
MD5
c709aa33c0165cebde24123555769a7a
-
SHA1
ad4813cd0461fbdbc7265dc7880e22978ffc7b54
-
SHA256
4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b
-
SHA512
ccd0ffc52ed12a4f2e74a0aef982dbd67b271412102e2373e07f24142560e0a0006d60166b1ba789bbb8745067c2d50e3e822f3355bdff2c52d22444151ab7eb
-
SSDEEP
12288:6yB0aI78IV40HioBu3yCeOr0rS6KsXr7ieWCU:BB07EyCTr0rFf7aC
-
Njrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Window
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1