General
-
Target
0f722c0c9b8b16575fa0a7d5ffc67cc59a07be308669599933c8362d1aca0cee
-
Size
188KB
-
Sample
250302-yhmgkssrw6
-
MD5
7bf85fb4ca2890cbec29eece00ab4dd3
-
SHA1
98322559eadf493625ecb1c45ee2f88496f3dbcb
-
SHA256
0f722c0c9b8b16575fa0a7d5ffc67cc59a07be308669599933c8362d1aca0cee
-
SHA512
3ca80df3013ba8eceb60f1e6b70bbcf9a3261652da52b5bc2cfc9248f8ce991a79b9979cf3e050a150fe8e93b3add25ee657eea8c1e5f43658f4ba5e9036b0ad
-
SSDEEP
3072:BSFKNYHiDg+NwA8eobw9XyPekpL6qwFqkBNjyERBdxD3I:lNgiyAd9XMtxwFqkLjM
Static task
static1
Behavioral task
behavioral1
Sample
0f722c0c9b8b16575fa0a7d5ffc67cc59a07be308669599933c8362d1aca0cee.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
0f722c0c9b8b16575fa0a7d5ffc67cc59a07be308669599933c8362d1aca0cee.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
njrat
0.7d
HacKed
bossik.ddns.net:777
5189075cbe03b536e4350cfebaeca464
-
reg_key
5189075cbe03b536e4350cfebaeca464
-
splitter
|'|'|
Targets
-
-
Target
0f722c0c9b8b16575fa0a7d5ffc67cc59a07be308669599933c8362d1aca0cee
-
Size
188KB
-
MD5
7bf85fb4ca2890cbec29eece00ab4dd3
-
SHA1
98322559eadf493625ecb1c45ee2f88496f3dbcb
-
SHA256
0f722c0c9b8b16575fa0a7d5ffc67cc59a07be308669599933c8362d1aca0cee
-
SHA512
3ca80df3013ba8eceb60f1e6b70bbcf9a3261652da52b5bc2cfc9248f8ce991a79b9979cf3e050a150fe8e93b3add25ee657eea8c1e5f43658f4ba5e9036b0ad
-
SSDEEP
3072:BSFKNYHiDg+NwA8eobw9XyPekpL6qwFqkBNjyERBdxD3I:lNgiyAd9XMtxwFqkLjM
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1