General
-
Target
Server3.exe
-
Size
37KB
-
Sample
240524-t9sepacg85
-
MD5
9572900a67ed67c643c7298b951d2104
-
SHA1
e3b7291e39cafe608ffbeadba8135658d22dde2f
-
SHA256
b9418ffff1fdc91b3257ef2c42e6edc1605b38f2534e93c4f487a72f98279496
-
SHA512
07a115cfb2d5a97f06a10740c1e0f5ef9fb13bb248e6fbf1d7a815fe7139d7d499d4dfc638fe6544012bfa27b324535487b8446234edd4480e0b0446f8f22173
-
SSDEEP
384:rkc6ikDRxdDsyNyyszPIRPr28msD+rAF+rMRTyN/0L+EcoinblneHQM3epzXoNC/:ADeyNBszPIRy1sqrM+rMRa8NuKgt
Behavioral task
behavioral1
Sample
Server3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Server3.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
im523
AbuSharaf
every-unnecessary.gl.at.ply.gg:41021
bcf19f19ec90f55db9d548f83598227f
-
reg_key
bcf19f19ec90f55db9d548f83598227f
-
splitter
|'|'|
Targets
-
-
Target
Server3.exe
-
Size
37KB
-
MD5
9572900a67ed67c643c7298b951d2104
-
SHA1
e3b7291e39cafe608ffbeadba8135658d22dde2f
-
SHA256
b9418ffff1fdc91b3257ef2c42e6edc1605b38f2534e93c4f487a72f98279496
-
SHA512
07a115cfb2d5a97f06a10740c1e0f5ef9fb13bb248e6fbf1d7a815fe7139d7d499d4dfc638fe6544012bfa27b324535487b8446234edd4480e0b0446f8f22173
-
SSDEEP
384:rkc6ikDRxdDsyNyyszPIRPr28msD+rAF+rMRTyN/0L+EcoinblneHQM3epzXoNC/:ADeyNBszPIRy1sqrM+rMRa8NuKgt
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1