Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Payload.exe
-
Size
54KB
-
Sample
250322-3a76jaxjz3
-
MD5
81e043b5ee1e8931c5ac4d6f79457590
-
SHA1
616f70b905d99605586de3fa2997135812f9faa1
-
SHA256
15e516db2e5992ec2ab10969b8b0fef5f86d37f3720cb3a738011fa3ca56a622
-
SHA512
e4933e3897f65a54b25f8e97084ab045b96b6645cb3a3ccdab80c0fd29dffdbf5f53a84b4a62c74d5190a3515b01226843b1f18da8f8768e667f7e97a9ee3e64
-
SSDEEP
1536:r3EVGt9gmgpDGxJSMGFWQcGD8X3xIEpm3g:QVGtGmCGxJSMGFWQnD8X3xIEpm
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win10ltsc2021-20250314-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
associates-studio.gl.at.ply.gg:55946
63c41129dcdd177a39b9286624eb2f23
-
reg_key
63c41129dcdd177a39b9286624eb2f23
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
Payload.exe
-
Size
54KB
-
MD5
81e043b5ee1e8931c5ac4d6f79457590
-
SHA1
616f70b905d99605586de3fa2997135812f9faa1
-
SHA256
15e516db2e5992ec2ab10969b8b0fef5f86d37f3720cb3a738011fa3ca56a622
-
SHA512
e4933e3897f65a54b25f8e97084ab045b96b6645cb3a3ccdab80c0fd29dffdbf5f53a84b4a62c74d5190a3515b01226843b1f18da8f8768e667f7e97a9ee3e64
-
SSDEEP
1536:r3EVGt9gmgpDGxJSMGFWQcGD8X3xIEpm3g:QVGtGmCGxJSMGFWQnD8X3xIEpm
-
Njrat family
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Pre-OS Boot
1Bootkit
1