General
-
Target
test.exe
-
Size
37KB
-
Sample
250401-fmq2fstwgt
-
MD5
16a43eef020c4257477762921ac3af49
-
SHA1
70d882c8f1608cb5cffbd79b9529ea05d645e0d6
-
SHA256
7b85fd11662a1771d964d2db2fd5ed9ff8bc3d6a9360493c92d776393b0ab0d4
-
SHA512
d205775ab117470a18c8644b95d8fbf50c3c8c766b46eabaed1445db4e32b4bf60ae3ebb96fc6354176e17f77a505d1b7e2a242605a597e326af19b4723840f8
-
SSDEEP
384:Dq+6WIiejtCVLO309Qmykrt4QdqMjf+vWEWYrAF+rMRTyN/0L+EcoinblneHQM3o:VHdGdkrOGb+eE7rM+rMRa8NuXJt
Behavioral task
behavioral1
Sample
test.exe
Resource
win11-20250313-en
Malware Config
Extracted
njrat
im523
HacKed
26.215.185.49:5552
52391190f1a4711b14e18998ba3c3bd4
-
reg_key
52391190f1a4711b14e18998ba3c3bd4
-
splitter
|'|'|
Targets
-
-
Target
test.exe
-
Size
37KB
-
MD5
16a43eef020c4257477762921ac3af49
-
SHA1
70d882c8f1608cb5cffbd79b9529ea05d645e0d6
-
SHA256
7b85fd11662a1771d964d2db2fd5ed9ff8bc3d6a9360493c92d776393b0ab0d4
-
SHA512
d205775ab117470a18c8644b95d8fbf50c3c8c766b46eabaed1445db4e32b4bf60ae3ebb96fc6354176e17f77a505d1b7e2a242605a597e326af19b4723840f8
-
SSDEEP
384:Dq+6WIiejtCVLO309Qmykrt4QdqMjf+vWEWYrAF+rMRTyN/0L+EcoinblneHQM3o:VHdGdkrOGb+eE7rM+rMRa8NuXJt
-
Njrat family
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1