General
-
Target
7fce93d7a0ba558b2de26cecc8f9d57d
-
Size
455KB
-
Sample
231219-xvag4scdg2
-
MD5
7fce93d7a0ba558b2de26cecc8f9d57d
-
SHA1
e957a6a02e091358888a7ca30e77652df102464e
-
SHA256
cf317453c3b9c8f13467a034f2a350fac57a7cfe2c038a86d9f706906fb2b6dc
-
SHA512
7f45fbaefc32e8b24790b137ee77c044e8ca3619c61d71db62a0307ed98e2102da607df496385ca82c49a093d57117de022e5e3d933062cad2e320e8688fbb6f
-
SSDEEP
6144:Od2/yLTYnbgz2q/ZyKphVdvoe77GUZqKCXF1x3HOb2YyPPD71lhNlOQ5JmpD:F/yPYb6wGv+U7cXOBQD3/e
Static task
static1
Behavioral task
behavioral1
Sample
7fce93d7a0ba558b2de26cecc8f9d57d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7fce93d7a0ba558b2de26cecc8f9d57d.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
njrat
im523
14.04.2017
ytka.duckdns.org:1604
ed423977d6a5549373be05c39703ea7d
-
reg_key
ed423977d6a5549373be05c39703ea7d
-
splitter
|'|'|
Targets
-
-
Target
7fce93d7a0ba558b2de26cecc8f9d57d
-
Size
455KB
-
MD5
7fce93d7a0ba558b2de26cecc8f9d57d
-
SHA1
e957a6a02e091358888a7ca30e77652df102464e
-
SHA256
cf317453c3b9c8f13467a034f2a350fac57a7cfe2c038a86d9f706906fb2b6dc
-
SHA512
7f45fbaefc32e8b24790b137ee77c044e8ca3619c61d71db62a0307ed98e2102da607df496385ca82c49a093d57117de022e5e3d933062cad2e320e8688fbb6f
-
SSDEEP
6144:Od2/yLTYnbgz2q/ZyKphVdvoe77GUZqKCXF1x3HOb2YyPPD71lhNlOQ5JmpD:F/yPYb6wGv+U7cXOBQD3/e
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1