General
-
Target
a043bfa7b151ac31e609a0245748e027.exe
-
Size
37KB
-
Sample
240219-aq6y7agc84
-
MD5
a043bfa7b151ac31e609a0245748e027
-
SHA1
f943edb4d73001d699957dce0eccf8662245a14a
-
SHA256
bcfa2d821757722293b60b92c321f29a8f1cb0662fcc724395715c55c7702980
-
SHA512
c15f912654cf9e0558329fabb3df657678b385d4c05884228527f32fcb4eb3a8fd35b80ac962ab92d2bac3f11687626cfb74128038fcb75b4d21a944cb1c303b
-
SSDEEP
384:XrU2eQilChHeTnMDGyef9qhxTe9/6ZurAF+rMRTyN/0L+EcoinblneHQM3epzXMC:Y2VSMD9ef9qLg6IrM+rMRa8Nuy8t
Behavioral task
behavioral1
Sample
a043bfa7b151ac31e609a0245748e027.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a043bfa7b151ac31e609a0245748e027.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
njrat
im523
Вова
0.tcp.eu.ngrok.io:13406
8226405da7534e38141265173ceb65d4
-
reg_key
8226405da7534e38141265173ceb65d4
-
splitter
|'|'|
Targets
-
-
Target
a043bfa7b151ac31e609a0245748e027.exe
-
Size
37KB
-
MD5
a043bfa7b151ac31e609a0245748e027
-
SHA1
f943edb4d73001d699957dce0eccf8662245a14a
-
SHA256
bcfa2d821757722293b60b92c321f29a8f1cb0662fcc724395715c55c7702980
-
SHA512
c15f912654cf9e0558329fabb3df657678b385d4c05884228527f32fcb4eb3a8fd35b80ac962ab92d2bac3f11687626cfb74128038fcb75b4d21a944cb1c303b
-
SSDEEP
384:XrU2eQilChHeTnMDGyef9qhxTe9/6ZurAF+rMRTyN/0L+EcoinblneHQM3epzXMC:Y2VSMD9ef9qLg6IrM+rMRa8Nuy8t
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1