General
-
Target
18b7b51ab055f7af12a53b1d2dd63f95_JC.bin
-
Size
16KB
-
Sample
230901-xbz9esha98
-
MD5
a3059c0aabf272cf685be59a621a766a
-
SHA1
193b1af4214417ed669bb61545a4e652f7ce2249
-
SHA256
25153d8cd34517f57076e5085ce6f6fa4d8a2f0475762c473d7436248a11d4e3
-
SHA512
d3a4a309bcfab2954e58ebbcd45dc082d95e285e102af6fd045b708133474e8651a53f422d7c533ff404f2ec447a35df88f2d677efe163fb6de0b7d6ab1094a0
-
SSDEEP
384:UlnptTgbBJh1p7dIJPFBJ2Wq9D1p/24mmml/GD4t4mro3:U9ptTgp1RdIJZ5qD/rmmmlODm4p3
Behavioral task
behavioral1
Sample
04b83cfb61645ef6aed2768b17841cad50bc34d31ac4c8311fae8a6038b23cb6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
04b83cfb61645ef6aed2768b17841cad50bc34d31ac4c8311fae8a6038b23cb6.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
njrat
im523
HacKed
147.185.221.16:33087
0475d37e6183d457eda0a2896dbf2265
-
reg_key
0475d37e6183d457eda0a2896dbf2265
-
splitter
|'|'|
Targets
-
-
Target
04b83cfb61645ef6aed2768b17841cad50bc34d31ac4c8311fae8a6038b23cb6.exe
-
Size
37KB
-
MD5
18b7b51ab055f7af12a53b1d2dd63f95
-
SHA1
c287aaccf3d40d08fce75a85932a6f8dcdc72565
-
SHA256
04b83cfb61645ef6aed2768b17841cad50bc34d31ac4c8311fae8a6038b23cb6
-
SHA512
5cfb295a3cdcabc2954133b0763caee6d70e918b76f3fde63148ddcf978e8c0ac73b56ed47afd5725c851c0d034e407634b47b87999e422376a09acce817ff48
-
SSDEEP
384:Z3Gwkfsgwi+Jx3+j/NSyszkoAXVs3G6aBrAF+rMRTyN/0L+EcoinblneHQM3epzk:Npkk/CNhszkoA+26OrM+rMRa8Nu+ht
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1