General
-
Target
248ef28ddf2c7907ebac2c3bdd1d8f79a4f6bfb430ea87cc857d2187b6bfc4d6
-
Size
37KB
-
Sample
240810-vnh5kayfpk
-
MD5
cb09a75beae0520f594a08df186d8d1d
-
SHA1
15f0d56be40b56350c7c91b5afff1ec33616ef26
-
SHA256
248ef28ddf2c7907ebac2c3bdd1d8f79a4f6bfb430ea87cc857d2187b6bfc4d6
-
SHA512
acc50e4dc005e94acc97e1f9fb3929ad8d6956c0d951e487538031c2c5d282f93a6ed70d4bf1b0eacce671489e9675843a49412a4f757107e116aee91cb51e1b
-
SSDEEP
384:HLyvEiTb7vpWNcwIyKrtaW/1TOOv2UthrAF+rMRTyN/0L+EcoinblneHQM3epzXK:ryjTwjKr8+oOeUXrM+rMRa8NuTct
Behavioral task
behavioral1
Sample
248ef28ddf2c7907ebac2c3bdd1d8f79a4f6bfb430ea87cc857d2187b6bfc4d6.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
248ef28ddf2c7907ebac2c3bdd1d8f79a4f6bfb430ea87cc857d2187b6bfc4d6.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
HacKed
193.32.248.218:443
321802fd71ac55feb1ecf54b190e0a8f
-
reg_key
321802fd71ac55feb1ecf54b190e0a8f
-
splitter
|'|'|
Targets
-
-
Target
248ef28ddf2c7907ebac2c3bdd1d8f79a4f6bfb430ea87cc857d2187b6bfc4d6
-
Size
37KB
-
MD5
cb09a75beae0520f594a08df186d8d1d
-
SHA1
15f0d56be40b56350c7c91b5afff1ec33616ef26
-
SHA256
248ef28ddf2c7907ebac2c3bdd1d8f79a4f6bfb430ea87cc857d2187b6bfc4d6
-
SHA512
acc50e4dc005e94acc97e1f9fb3929ad8d6956c0d951e487538031c2c5d282f93a6ed70d4bf1b0eacce671489e9675843a49412a4f757107e116aee91cb51e1b
-
SSDEEP
384:HLyvEiTb7vpWNcwIyKrtaW/1TOOv2UthrAF+rMRTyN/0L+EcoinblneHQM3epzXK:ryjTwjKr8+oOeUXrM+rMRa8NuTct
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1