General
-
Target
005fed6033a7f77a9b7b236ce0509be44215c6bd25d7fae2e54c805f98f6ab2d.exe
-
Size
863KB
-
Sample
250208-abkgmswjer
-
MD5
af070137205d4c3cdb7d04e6ad091526
-
SHA1
4f98682f27efd1234df058df3894190e7faab7ad
-
SHA256
005fed6033a7f77a9b7b236ce0509be44215c6bd25d7fae2e54c805f98f6ab2d
-
SHA512
2b0a82dd53783b880d029d25295ec41c88f47af04addeac0216c8cf20ae5bf0f1cc443bd8a5c04f07f19212d7f01374d15db5a72a188102edf13887fdb4babc9
-
SSDEEP
12288:W4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgav7RyFq9MmCSW:W4lavt0LkLL9IMixoEgeajRyFq9MmCSW
Static task
static1
Behavioral task
behavioral1
Sample
005fed6033a7f77a9b7b236ce0509be44215c6bd25d7fae2e54c805f98f6ab2d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
005fed6033a7f77a9b7b236ce0509be44215c6bd25d7fae2e54c805f98f6ab2d.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
279f6960ed84a752570aca7fb2dc1552
-
reg_key
279f6960ed84a752570aca7fb2dc1552
-
splitter
|'|'|
Targets
-
-
Target
005fed6033a7f77a9b7b236ce0509be44215c6bd25d7fae2e54c805f98f6ab2d.exe
-
Size
863KB
-
MD5
af070137205d4c3cdb7d04e6ad091526
-
SHA1
4f98682f27efd1234df058df3894190e7faab7ad
-
SHA256
005fed6033a7f77a9b7b236ce0509be44215c6bd25d7fae2e54c805f98f6ab2d
-
SHA512
2b0a82dd53783b880d029d25295ec41c88f47af04addeac0216c8cf20ae5bf0f1cc443bd8a5c04f07f19212d7f01374d15db5a72a188102edf13887fdb4babc9
-
SSDEEP
12288:W4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgav7RyFq9MmCSW:W4lavt0LkLL9IMixoEgeajRyFq9MmCSW
-
Njrat family
-
UAC bypass
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3