General
-
Target
Server.exe
-
Size
93KB
-
Sample
250324-wy8zeaxmx6
-
MD5
baf41f63bc78adc8c6d2436c8f37639a
-
SHA1
e4c599d34c45f9afc8a33f7fab431940d8471708
-
SHA256
05a2f56026b5a9e1ea1684b9a2a91a1cd814415f463c4b35626784d377891b54
-
SHA512
f7b982de9411419132be9fa6ef0a050b99d56a97f5b23899e783250d847840fa336dea116ae92a547ab894d64997293601bda5c4145a18968cace8fac310d1ba
-
SSDEEP
1536:OUwC+xhUa9urgOBPRNvM4jEwzGi1dDeDMgS:OUmUa9urgObdGi1dQl
Behavioral task
behavioral1
Sample
Server.exe
Resource
win11-20250313-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
september-idol.gl.at.ply.gg:60127
a07ed3473b57c095d69710069d48f926
-
reg_key
a07ed3473b57c095d69710069d48f926
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
93KB
-
MD5
baf41f63bc78adc8c6d2436c8f37639a
-
SHA1
e4c599d34c45f9afc8a33f7fab431940d8471708
-
SHA256
05a2f56026b5a9e1ea1684b9a2a91a1cd814415f463c4b35626784d377891b54
-
SHA512
f7b982de9411419132be9fa6ef0a050b99d56a97f5b23899e783250d847840fa336dea116ae92a547ab894d64997293601bda5c4145a18968cace8fac310d1ba
-
SSDEEP
1536:OUwC+xhUa9urgOBPRNvM4jEwzGi1dDeDMgS:OUmUa9urgObdGi1dQl
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Executes dropped EXE
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Enumerates processes with tasklist
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Accessibility Features
1Netsh Helper DLL
1Power Settings
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Accessibility Features
1Netsh Helper DLL
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Discovery
Peripheral Device Discovery
2Process Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1System Time Discovery
1