Analysis
-
max time kernel
2s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 18:22
Behavioral task
behavioral1
Sample
babv.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
babv.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
babv.exe
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral4
Sample
babv.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral5
Sample
babv.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral6
Sample
babv.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
babv.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral8
Sample
babv.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral9
Sample
babv.exe
Resource
debian9-mipsel-20240729-en
General
-
Target
babv.exe
-
Size
29KB
-
MD5
85e61aaafe402f7a04e793a53288a072
-
SHA1
e8d088224025f54c58fa11e8b9835fa7dfd3b9ff
-
SHA256
a7ae40544682a27bb1837c0c5d99f417bb4b8e8036e851529fe49a3d507a570b
-
SHA512
cbfd7413fa3373e4c947c35b9605c1dade7159de0990f0961eef2bc4e2dc5e06b2e8cef974f9ada76951732a74d715c84d22e58c7dd1a841eab0e3096cc36511
-
SSDEEP
384:tBs/hl7b1/JEI+GPWrb5hFEaemqD6CLeQTGBsbh0w4wlAokw9OhgOL1vYRGOZz/L:t47bXEI+GevhEsqdLe3BKh0p29SgR5d
Malware Config
Extracted
njrat
0.6.4
HacKed
195.88.218.126:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2432 netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language babv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\babv.exe"C:\Users\Admin\AppData\Local\Temp\babv.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵PID:644
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD585e61aaafe402f7a04e793a53288a072
SHA1e8d088224025f54c58fa11e8b9835fa7dfd3b9ff
SHA256a7ae40544682a27bb1837c0c5d99f417bb4b8e8036e851529fe49a3d507a570b
SHA512cbfd7413fa3373e4c947c35b9605c1dade7159de0990f0961eef2bc4e2dc5e06b2e8cef974f9ada76951732a74d715c84d22e58c7dd1a841eab0e3096cc36511