General
-
Target
5cddb195a5f268b825c0936367050288cd4b28992b07303e71e1c4fb169a54d0.exe
-
Size
26KB
-
Sample
250224-2b8ysa1lx8
-
MD5
177541a5541eed56d845e699f88ff5cb
-
SHA1
50c26a3d90a95329d8f1cb6a513e56ae0528507f
-
SHA256
5cddb195a5f268b825c0936367050288cd4b28992b07303e71e1c4fb169a54d0
-
SHA512
4e6ba475f91ca3a3045006c3257bff137d01ba47956c9f037ff59f7fff98664343d82cbd8578a061c598362586a532ffea40621123bd41b98bd4c56c8c0bb80a
-
SSDEEP
384:ALBnSHanO4Y7yJMEoeBCsPodxxMzAQk93vmhm7UMKmIEecKdbXTzm9bVhcam6CrS:eBS/oVt3zA/vMHTi9bD/
Behavioral task
behavioral1
Sample
5cddb195a5f268b825c0936367050288cd4b28992b07303e71e1c4fb169a54d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5cddb195a5f268b825c0936367050288cd4b28992b07303e71e1c4fb169a54d0.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
njrat
v4.0
Recov
193.161.193.99:24753
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
5cddb195a5f268b825c0936367050288cd4b28992b07303e71e1c4fb169a54d0.exe
-
Size
26KB
-
MD5
177541a5541eed56d845e699f88ff5cb
-
SHA1
50c26a3d90a95329d8f1cb6a513e56ae0528507f
-
SHA256
5cddb195a5f268b825c0936367050288cd4b28992b07303e71e1c4fb169a54d0
-
SHA512
4e6ba475f91ca3a3045006c3257bff137d01ba47956c9f037ff59f7fff98664343d82cbd8578a061c598362586a532ffea40621123bd41b98bd4c56c8c0bb80a
-
SSDEEP
384:ALBnSHanO4Y7yJMEoeBCsPodxxMzAQk93vmhm7UMKmIEecKdbXTzm9bVhcam6CrS:eBS/oVt3zA/vMHTi9bD/
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1