General
-
Target
ae14ddfa9d6a02d17a44cac525f1bb524ecd1d3241c2c1604122bd762f791ed6
-
Size
93KB
-
Sample
250208-djtbas1pd1
-
MD5
37e7cdd750ac364b0289287497294d10
-
SHA1
086eb7a4ddd07bf21db1e125392e29de272b2bbf
-
SHA256
ae14ddfa9d6a02d17a44cac525f1bb524ecd1d3241c2c1604122bd762f791ed6
-
SHA512
41fc25c5f041e5f41b07bef8aa6cc604c077fb9b7d042f3e494530ccf4ecdaab241efe4bfd69dd7260e6e8278d23241bf38e1def53d6294fddeb53eaa32fb0b9
-
SSDEEP
768:uY3EV530YTXspgM0m2zGjpyDtdXWuDtXYLWhyXxrjEtCdnl2pi1Rz4Rk3SsGdpI3:+VZ0AA0mT1mrWnL5jEwzGi1dDuDIgS
Behavioral task
behavioral1
Sample
ae14ddfa9d6a02d17a44cac525f1bb524ecd1d3241c2c1604122bd762f791ed6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ae14ddfa9d6a02d17a44cac525f1bb524ecd1d3241c2c1604122bd762f791ed6.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:5513
b7ee64dfceb91cd38897f066dbb39a91
-
reg_key
b7ee64dfceb91cd38897f066dbb39a91
-
splitter
|'|'|
Targets
-
-
Target
ae14ddfa9d6a02d17a44cac525f1bb524ecd1d3241c2c1604122bd762f791ed6
-
Size
93KB
-
MD5
37e7cdd750ac364b0289287497294d10
-
SHA1
086eb7a4ddd07bf21db1e125392e29de272b2bbf
-
SHA256
ae14ddfa9d6a02d17a44cac525f1bb524ecd1d3241c2c1604122bd762f791ed6
-
SHA512
41fc25c5f041e5f41b07bef8aa6cc604c077fb9b7d042f3e494530ccf4ecdaab241efe4bfd69dd7260e6e8278d23241bf38e1def53d6294fddeb53eaa32fb0b9
-
SSDEEP
768:uY3EV530YTXspgM0m2zGjpyDtdXWuDtXYLWhyXxrjEtCdnl2pi1Rz4Rk3SsGdpI3:+VZ0AA0mT1mrWnL5jEwzGi1dDuDIgS
-
Njrat family
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1