General
-
Target
2a90afb703f7d1a880bde838ed5b3f1fe0f3d181c73ecd310334ead008a311a7
-
Size
81KB
-
Sample
231215-sesljaddgp
-
MD5
fcdc00c2ffbba2c3d8542caae869b26a
-
SHA1
001477818c29be49b4dcc903127ee2e55b140e0a
-
SHA256
2a90afb703f7d1a880bde838ed5b3f1fe0f3d181c73ecd310334ead008a311a7
-
SHA512
989cc00b0508715649febe386b0f6d7d3fa31abf8b75c2322ff0c752e0547a079fc58825025882ddba4c228596edf727fbbe72fb44ef51986ab83f945e571213
-
SSDEEP
384:FgaIiupjtD+P3V+y0bjyvGtHpcsu2DJrAF+rMRTyN/0L+EcoinblneHQM3epzXyi:ehmV10bjyvGtyt2NrM+rMRa8NuoWt
Behavioral task
behavioral1
Sample
2a90afb703f7d1a880bde838ed5b3f1fe0f3d181c73ecd310334ead008a311a7.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
2a90afb703f7d1a880bde838ed5b3f1fe0f3d181c73ecd310334ead008a311a7.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
njrat
im523
aboba
hotels-nursery.gl.at.ply.gg:44966
abf5c2a945ee5ef70b809a60e3819e22
-
reg_key
abf5c2a945ee5ef70b809a60e3819e22
-
splitter
|'|'|
Targets
-
-
Target
2a90afb703f7d1a880bde838ed5b3f1fe0f3d181c73ecd310334ead008a311a7
-
Size
81KB
-
MD5
fcdc00c2ffbba2c3d8542caae869b26a
-
SHA1
001477818c29be49b4dcc903127ee2e55b140e0a
-
SHA256
2a90afb703f7d1a880bde838ed5b3f1fe0f3d181c73ecd310334ead008a311a7
-
SHA512
989cc00b0508715649febe386b0f6d7d3fa31abf8b75c2322ff0c752e0547a079fc58825025882ddba4c228596edf727fbbe72fb44ef51986ab83f945e571213
-
SSDEEP
384:FgaIiupjtD+P3V+y0bjyvGtHpcsu2DJrAF+rMRTyN/0L+EcoinblneHQM3epzXyi:ehmV10bjyvGtyt2NrM+rMRa8NuoWt
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1