General
-
Target
Shelbag anylizer.exe
-
Size
93KB
-
Sample
240514-xw5pmsbg9s
-
MD5
1ead93be70fe9a5c810e495eb7a03fda
-
SHA1
cc23e50346278e4e43cd555cef0f2717bb6b888a
-
SHA256
bdcfadcd70c3f7257a4b76181146424698309059fa089a6d7a83a76ea063c601
-
SHA512
76828126e5994e01e31a027fa86a5d87aa0f278e6799e54fdf4f9429a746406621e4db6e57aac3d8421fa046efe66e089e35ea44ea516f2a20fce827dba12fbb
-
SSDEEP
768:NY3KkgyYtrF4M5Y2XaxKlwnvhDL95XpJCTXTfGBqXxrjEtCdnl2pi1Rz4Rk38sGt:NkZYZpXajhLff2TfRjEwzGi1dDUDRgS
Behavioral task
behavioral1
Sample
Shelbag anylizer.exe
Resource
win7-20240221-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
0.tcp.eu.ngrok.io:12272
5ebdc7b19669104b071decf7763dfb48
-
reg_key
5ebdc7b19669104b071decf7763dfb48
-
splitter
|'|'|
Targets
-
-
Target
Shelbag anylizer.exe
-
Size
93KB
-
MD5
1ead93be70fe9a5c810e495eb7a03fda
-
SHA1
cc23e50346278e4e43cd555cef0f2717bb6b888a
-
SHA256
bdcfadcd70c3f7257a4b76181146424698309059fa089a6d7a83a76ea063c601
-
SHA512
76828126e5994e01e31a027fa86a5d87aa0f278e6799e54fdf4f9429a746406621e4db6e57aac3d8421fa046efe66e089e35ea44ea516f2a20fce827dba12fbb
-
SSDEEP
768:NY3KkgyYtrF4M5Y2XaxKlwnvhDL95XpJCTXTfGBqXxrjEtCdnl2pi1Rz4Rk38sGt:NkZYZpXajhLff2TfRjEwzGi1dDUDRgS
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-