General
-
Target
0fbd44c0822387461816967898b57865.exe
-
Size
636KB
-
Sample
240101-yn88jabef4
-
MD5
0fbd44c0822387461816967898b57865
-
SHA1
5bdff7cd36e866e6d5f122b5d18e871653740ab4
-
SHA256
edba8ccd7dfdd0f156fb80183439684faf4aa2f70f131d4ee192e73e12e72f0f
-
SHA512
aa783b078e3a1e65fe8ff3597eb1dffc7d1267cf9bbe50b8d32dc39dcb9673bebcfed7743b4a31114c9dad4a5bd0df35978ad87c83525b7a82d805245fc0e78b
-
SSDEEP
12288:Uzpeojs6NrsfWa/G2oy9bawFkHaW6Ofm1VHV:UYEE/9baXaW6Oc1
Behavioral task
behavioral1
Sample
0fbd44c0822387461816967898b57865.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fbd44c0822387461816967898b57865.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
njrat
0.7d
Destroyer
plankxd.ddns.net:1177
2f806f40c5d4533d860b3bd9e1a2b698
-
reg_key
2f806f40c5d4533d860b3bd9e1a2b698
-
splitter
|'|'|
Targets
-
-
Target
0fbd44c0822387461816967898b57865.exe
-
Size
636KB
-
MD5
0fbd44c0822387461816967898b57865
-
SHA1
5bdff7cd36e866e6d5f122b5d18e871653740ab4
-
SHA256
edba8ccd7dfdd0f156fb80183439684faf4aa2f70f131d4ee192e73e12e72f0f
-
SHA512
aa783b078e3a1e65fe8ff3597eb1dffc7d1267cf9bbe50b8d32dc39dcb9673bebcfed7743b4a31114c9dad4a5bd0df35978ad87c83525b7a82d805245fc0e78b
-
SSDEEP
12288:Uzpeojs6NrsfWa/G2oy9bawFkHaW6Ofm1VHV:UYEE/9baXaW6Oc1
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1