General
-
Target
Server.exe
-
Size
37KB
-
Sample
231106-wgm1lsed37
-
MD5
37b90a300f36744b6fc9ce797b963a94
-
SHA1
2d5456e337c04011f09cb98fffb35f409e7041b9
-
SHA256
0d65edf0f9abb44623414395837b42e8b0e9b348435c7b00202976dfed4b96bc
-
SHA512
68b6da47b0b61a47602a0ebd51aa5ed6988954a71700ed4b02d9843815fd22fe56506c1fdd79d52729f0f878024b23d613418eede72edbb2ad53032207faeb17
-
SSDEEP
384:QXunmSIiejBCVLO309QmykrtsM9Wwffyv2A78rAF+rMRTyN/0L+EcoinblneHQMk:JbdGdkrCCHy+AgrM+rMRa8NucQJt
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
njrat
im523
tria
mingrelian.duckdns.org:5552
17276d02181a20b1af2084d1b88f360b
-
reg_key
17276d02181a20b1af2084d1b88f360b
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
37KB
-
MD5
37b90a300f36744b6fc9ce797b963a94
-
SHA1
2d5456e337c04011f09cb98fffb35f409e7041b9
-
SHA256
0d65edf0f9abb44623414395837b42e8b0e9b348435c7b00202976dfed4b96bc
-
SHA512
68b6da47b0b61a47602a0ebd51aa5ed6988954a71700ed4b02d9843815fd22fe56506c1fdd79d52729f0f878024b23d613418eede72edbb2ad53032207faeb17
-
SSDEEP
384:QXunmSIiejBCVLO309QmykrtsM9Wwffyv2A78rAF+rMRTyN/0L+EcoinblneHQMk:JbdGdkrCCHy+AgrM+rMRa8NucQJt
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1