General
-
Target
8e1a79e5b3fb5504bf0ff03e5afee9b0e583c7c12e6948f9d2ef009fdaf7f411N.exe
-
Size
863KB
-
Sample
250208-nmvnmsslct
-
MD5
eabac3adb5241da6df09c97b263811d0
-
SHA1
62a415bb864a72640160925d902e59a19f6a0b29
-
SHA256
8e1a79e5b3fb5504bf0ff03e5afee9b0e583c7c12e6948f9d2ef009fdaf7f411
-
SHA512
e466b1d065460c1adee33d2e3524fc2676784dcbc0383d227e7b4bbcd07805ee34fe0963b31e5f6b93b5406972bae003fe57b385ed090d32fbbd6d6c8b80f201
-
SSDEEP
12288:W4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgav7RyFq9MmCS:W4lavt0LkLL9IMixoEgeajRyFq9MmCS
Static task
static1
Behavioral task
behavioral1
Sample
8e1a79e5b3fb5504bf0ff03e5afee9b0e583c7c12e6948f9d2ef009fdaf7f411N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e1a79e5b3fb5504bf0ff03e5afee9b0e583c7c12e6948f9d2ef009fdaf7f411N.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
279f6960ed84a752570aca7fb2dc1552
-
reg_key
279f6960ed84a752570aca7fb2dc1552
-
splitter
|'|'|
Targets
-
-
Target
8e1a79e5b3fb5504bf0ff03e5afee9b0e583c7c12e6948f9d2ef009fdaf7f411N.exe
-
Size
863KB
-
MD5
eabac3adb5241da6df09c97b263811d0
-
SHA1
62a415bb864a72640160925d902e59a19f6a0b29
-
SHA256
8e1a79e5b3fb5504bf0ff03e5afee9b0e583c7c12e6948f9d2ef009fdaf7f411
-
SHA512
e466b1d065460c1adee33d2e3524fc2676784dcbc0383d227e7b4bbcd07805ee34fe0963b31e5f6b93b5406972bae003fe57b385ed090d32fbbd6d6c8b80f201
-
SSDEEP
12288:W4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgav7RyFq9MmCS:W4lavt0LkLL9IMixoEgeajRyFq9MmCS
-
Njrat family
-
UAC bypass
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3