General
-
Target
2025-04-04_c10e261059dec2ce4a188f30800f1d08_black-basta_dcrat
-
Size
18.4MB
-
Sample
250404-mmzf6axk19
-
MD5
c10e261059dec2ce4a188f30800f1d08
-
SHA1
cf07607f60b50defa6f7984bd172d1d6685f005f
-
SHA256
693bfa070b06ffa9dd3d26cd7581ff20c78c1fea55c4530f0ee6b9763a8ec86b
-
SHA512
1747b15b353cc7ad10a73d9e1bf681358e47447170922ab3079e49fe2f57ce9d094302b1d159829122f01b6f7329cd1a2908ff0a2de6008f75446d3f95d28e3b
-
SSDEEP
393216:GA3mjsPL01+l+uq+Vvz1+TtIiFo0VYAj8viX219lFhSxrH+8rLBS+gZQy:GKm4j01+l+uqgvz1QtImX8vimbzcxr3h
Behavioral task
behavioral1
Sample
2025-04-04_c10e261059dec2ce4a188f30800f1d08_black-basta_dcrat.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
njrat
0.7d
HacKed
vpn1.hackcrack.io:38013
Windows Explorer
-
reg_key
Windows Explorer
-
splitter
|'|'|
Targets
-
-
Target
2025-04-04_c10e261059dec2ce4a188f30800f1d08_black-basta_dcrat
-
Size
18.4MB
-
MD5
c10e261059dec2ce4a188f30800f1d08
-
SHA1
cf07607f60b50defa6f7984bd172d1d6685f005f
-
SHA256
693bfa070b06ffa9dd3d26cd7581ff20c78c1fea55c4530f0ee6b9763a8ec86b
-
SHA512
1747b15b353cc7ad10a73d9e1bf681358e47447170922ab3079e49fe2f57ce9d094302b1d159829122f01b6f7329cd1a2908ff0a2de6008f75446d3f95d28e3b
-
SSDEEP
393216:GA3mjsPL01+l+uq+Vvz1+TtIiFo0VYAj8viX219lFhSxrH+8rLBS+gZQy:GKm4j01+l+uqgvz1QtImX8vimbzcxr3h
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1