General
-
Target
Server22.exe
-
Size
36KB
-
Sample
240721-wsdw3s1bnp
-
MD5
a999dbe7f1ccae86eae73f30950edc69
-
SHA1
a02f41e70bbba5d98386f328365e40e376644e57
-
SHA256
fed8c3b6b74a39a3a7d759e8d9df768f2df2b4ac64f26efb5dfb60071a96d32d
-
SHA512
39be4c91ca5eb0c11f0499ae9886016b854664a32efee465d895351074f9c5fcd0a28ee70ae4e8fbcd880ad85c8f11a28ab42ae4130fffe9cc44c323630bde6a
-
SSDEEP
384:hv5Zjj6icFri5Z7JAyk/G4OvhRZea6FwrAF+rMRTyN/0L+EcoinblneHQM3epzXE:95LHJ7k/G4ObZr6GrM+rMRa8NuZ9+t
Behavioral task
behavioral1
Sample
Server22.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
Server22.exe
Resource
win11-20240709-en
Malware Config
Extracted
njrat
im523
ضحايا Repo
147.185.221.21:19455
ff08ef465dd80a9af68f3e1ab659a49e
-
reg_key
ff08ef465dd80a9af68f3e1ab659a49e
-
splitter
|'|'|
Targets
-
-
Target
Server22.exe
-
Size
36KB
-
MD5
a999dbe7f1ccae86eae73f30950edc69
-
SHA1
a02f41e70bbba5d98386f328365e40e376644e57
-
SHA256
fed8c3b6b74a39a3a7d759e8d9df768f2df2b4ac64f26efb5dfb60071a96d32d
-
SHA512
39be4c91ca5eb0c11f0499ae9886016b854664a32efee465d895351074f9c5fcd0a28ee70ae4e8fbcd880ad85c8f11a28ab42ae4130fffe9cc44c323630bde6a
-
SSDEEP
384:hv5Zjj6icFri5Z7JAyk/G4OvhRZea6FwrAF+rMRTyN/0L+EcoinblneHQM3epzXE:95LHJ7k/G4ObZr6GrM+rMRa8NuZ9+t
Score8/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1