General
-
Target
3c0c8341a5c799791524e3cff41e7a99cd5e2eabf93a122d551896186bc88ca8
-
Size
37KB
-
Sample
250225-sbq9as1pv9
-
MD5
aa83d654a4475f46e61c95fbd89ee18f
-
SHA1
423100a56f74e572502b1be8046f2e26abd9244e
-
SHA256
3c0c8341a5c799791524e3cff41e7a99cd5e2eabf93a122d551896186bc88ca8
-
SHA512
61ce64757af6da152ba505b1c9cfab0b8c3932b01e8ca999353cdd2e14c7469ee5fb480b6d978dd0d040339814ee67c67cf63043e8d24d3f6ec1e22e71294798
-
SSDEEP
384:4CdsoixJvl7OHg1WykrqSTX3y8RsIDoJrAF+rMRTyN/0L+EcoinblneHQM3epzXR:Rd+R1NkrqSTSasIurM+rMRa8Nuq6t
Behavioral task
behavioral1
Sample
3c0c8341a5c799791524e3cff41e7a99cd5e2eabf93a122d551896186bc88ca8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c0c8341a5c799791524e3cff41e7a99cd5e2eabf93a122d551896186bc88ca8.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
njrat
im523
HacKed_NotFully
moneroman.ddns.net:1194
5f1c1f4a8f4a8082788e31e499b05f88
-
reg_key
5f1c1f4a8f4a8082788e31e499b05f88
-
splitter
|'|'|
Targets
-
-
Target
3c0c8341a5c799791524e3cff41e7a99cd5e2eabf93a122d551896186bc88ca8
-
Size
37KB
-
MD5
aa83d654a4475f46e61c95fbd89ee18f
-
SHA1
423100a56f74e572502b1be8046f2e26abd9244e
-
SHA256
3c0c8341a5c799791524e3cff41e7a99cd5e2eabf93a122d551896186bc88ca8
-
SHA512
61ce64757af6da152ba505b1c9cfab0b8c3932b01e8ca999353cdd2e14c7469ee5fb480b6d978dd0d040339814ee67c67cf63043e8d24d3f6ec1e22e71294798
-
SSDEEP
384:4CdsoixJvl7OHg1WykrqSTX3y8RsIDoJrAF+rMRTyN/0L+EcoinblneHQM3epzXR:Rd+R1NkrqSTSasIurM+rMRa8Nuq6t
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1