General
-
Target
Server.exe
-
Size
93KB
-
Sample
250329-myb51a1zf1
-
MD5
be8230b1a5ba47dacb5b4d4f990f0da2
-
SHA1
1c44f6422cdf7117c69ab172625eee8d8a561159
-
SHA256
c7bd3056f1c01d0d36cd4ee675677f9dd20be0684fe8520f18df7d303c494e94
-
SHA512
26176c2277701fc6b2dd568cb7e9448a83ebfb4f4394469e24ed44511870b3d57e1cd6b6bbe8a305f2bebb7c701330a5be2e37b1f35c19055f43f640c879e402
-
SSDEEP
1536:NUwC+xhUa9urgOBPmNvMcjEwzGi1dDGDIgS:NUmUa9urgOkdCi1dYx
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
2.tcp.eu.ngrok.io:19281
1611d7b8bf80b0aaf61e5b786e58a4b5
-
reg_key
1611d7b8bf80b0aaf61e5b786e58a4b5
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
93KB
-
MD5
be8230b1a5ba47dacb5b4d4f990f0da2
-
SHA1
1c44f6422cdf7117c69ab172625eee8d8a561159
-
SHA256
c7bd3056f1c01d0d36cd4ee675677f9dd20be0684fe8520f18df7d303c494e94
-
SHA512
26176c2277701fc6b2dd568cb7e9448a83ebfb4f4394469e24ed44511870b3d57e1cd6b6bbe8a305f2bebb7c701330a5be2e37b1f35c19055f43f640c879e402
-
SSDEEP
1536:NUwC+xhUa9urgOBPmNvMcjEwzGi1dDGDIgS:NUmUa9urgOkdCi1dYx
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1