General
-
Target
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf
-
Size
23KB
-
Sample
250331-vbtqjawny9
-
MD5
c68fa9e0a6c46464ffc55536e04cd0cb
-
SHA1
46a01b1c1ed07b403704595b54da788f87758fba
-
SHA256
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf
-
SHA512
89c31eeba8ae22d34496584ddc4671e4b21f83ed54e16cd3e7f66fedd36dffa1915e7d2fbfcdf7cce4bf03d68cb77d53e7f03a6b42aa796bd35f506ce2952387
-
SSDEEP
384:zY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZwzCFy:cL2s+tRyRpcnuHGU
Behavioral task
behavioral1
Sample
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
0.7d
cheat
4.tcp.ngrok.io:19451
efea00bfd82100063e3ba5f5434189d9
-
reg_key
efea00bfd82100063e3ba5f5434189d9
-
splitter
|'|'|
Targets
-
-
Target
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf
-
Size
23KB
-
MD5
c68fa9e0a6c46464ffc55536e04cd0cb
-
SHA1
46a01b1c1ed07b403704595b54da788f87758fba
-
SHA256
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf
-
SHA512
89c31eeba8ae22d34496584ddc4671e4b21f83ed54e16cd3e7f66fedd36dffa1915e7d2fbfcdf7cce4bf03d68cb77d53e7f03a6b42aa796bd35f506ce2952387
-
SSDEEP
384:zY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZwzCFy:cL2s+tRyRpcnuHGU
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1