General
-
Target
2e6d807e953cc0961f1bae27e34bc50d
-
Size
37KB
-
Sample
240725-em9ccsxerm
-
MD5
2e6d807e953cc0961f1bae27e34bc50d
-
SHA1
6d31a3685f9d5aba311fcdd6d4d99e1f14a2075f
-
SHA256
3588af722c9a76025bedf0cf8ea0da977652c57173cd9e360f1905c48a35f312
-
SHA512
c1a2af38ad8c0b05676ef5f28dcb11de0504de008c016b4942199b9ba0b79d52f0e29efd98573d4d2ee81630f35de9cc5692a06fc11a6baac0066dee43df2063
-
SSDEEP
384:99aeBaNit/FbOn0aH2ykrISXfZ8zPuvlrAF+rMRTyN/0L+EcoinblneHQM3epzXE:naD4NWtkrISviLu9rM+rMRa8Nu7Ct
Behavioral task
behavioral1
Sample
2e6d807e953cc0961f1bae27e34bc50d.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e6d807e953cc0961f1bae27e34bc50d.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
njrat
im523
HacKed
45.83.207.67:6652
435e5d62355646e5495fb86b5a8982b6
-
reg_key
435e5d62355646e5495fb86b5a8982b6
-
splitter
|'|'|
Targets
-
-
Target
2e6d807e953cc0961f1bae27e34bc50d
-
Size
37KB
-
MD5
2e6d807e953cc0961f1bae27e34bc50d
-
SHA1
6d31a3685f9d5aba311fcdd6d4d99e1f14a2075f
-
SHA256
3588af722c9a76025bedf0cf8ea0da977652c57173cd9e360f1905c48a35f312
-
SHA512
c1a2af38ad8c0b05676ef5f28dcb11de0504de008c016b4942199b9ba0b79d52f0e29efd98573d4d2ee81630f35de9cc5692a06fc11a6baac0066dee43df2063
-
SSDEEP
384:99aeBaNit/FbOn0aH2ykrISXfZ8zPuvlrAF+rMRTyN/0L+EcoinblneHQM3epzXE:naD4NWtkrISviLu9rM+rMRa8Nu7Ct
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1