General
-
Target
0a17085284e35aeb2a858cf52aca72006e797f814e5d73ce6633d66f5ad5461f
-
Size
8.7MB
-
Sample
250328-pmatxaxn12
-
MD5
0d90ac3b185f0c527fcc6d318c2080d5
-
SHA1
d4b11a0825bbcd90e73b3e3119c9460927ff1248
-
SHA256
0a17085284e35aeb2a858cf52aca72006e797f814e5d73ce6633d66f5ad5461f
-
SHA512
57e2481908915a2072b83379a5e1242a9f82eab2ffe1bbe7e27378f4bc27f9674c998fe72a46afefbb58a2f7d776166a3e28745ad9e0056ea5169237353ea825
-
SSDEEP
196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbs:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmI
Static task
static1
Behavioral task
behavioral1
Sample
0a17085284e35aeb2a858cf52aca72006e797f814e5d73ce6633d66f5ad5461f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0a17085284e35aeb2a858cf52aca72006e797f814e5d73ce6633d66f5ad5461f.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
0.7d
jjj
youri.mooo.com:1605
e936a10f968ac948cd351c9629dbd36d
-
reg_key
e936a10f968ac948cd351c9629dbd36d
-
splitter
|'|'|
Targets
-
-
Target
0a17085284e35aeb2a858cf52aca72006e797f814e5d73ce6633d66f5ad5461f
-
Size
8.7MB
-
MD5
0d90ac3b185f0c527fcc6d318c2080d5
-
SHA1
d4b11a0825bbcd90e73b3e3119c9460927ff1248
-
SHA256
0a17085284e35aeb2a858cf52aca72006e797f814e5d73ce6633d66f5ad5461f
-
SHA512
57e2481908915a2072b83379a5e1242a9f82eab2ffe1bbe7e27378f4bc27f9674c998fe72a46afefbb58a2f7d776166a3e28745ad9e0056ea5169237353ea825
-
SSDEEP
196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbs:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmI
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1