General
-
Target
0x0036000000015d4215.dat
-
Size
37KB
-
Sample
240827-xmmgpsxhpk
-
MD5
93bf6f4e5c7a5cfa70924d084796388d
-
SHA1
92c32c2ae89aefceb51468eca032adce232e0bbb
-
SHA256
3180329acbe4bef309498a65b0db0df853102257fdc3c71838c969289121f425
-
SHA512
eb13a2d5590aa20e426a8d93b27d57f467be9efe496a180d2c6c921597b6ed2b232a0e0c43dd451b377b356c2ffa22083062c67172b9f109d3efa87e31e6de42
-
SSDEEP
384:nlmFnqi0lJZtbH9KyM+2VzmiPZMsWerErAF+rMRTyN/0L+EcoinblneHQM3epzXW:lmSJ95M+2V6iqVe4rM+rMRa8NuMJt
Behavioral task
behavioral1
Sample
0x0036000000015d4215.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0x0036000000015d4215.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
HacKed
born-administrative.gl.at.ply.gg:10324
c6aa749155b3480287d64e2d4a50cdbf
-
reg_key
c6aa749155b3480287d64e2d4a50cdbf
-
splitter
|'|'|
Targets
-
-
Target
0x0036000000015d4215.dat
-
Size
37KB
-
MD5
93bf6f4e5c7a5cfa70924d084796388d
-
SHA1
92c32c2ae89aefceb51468eca032adce232e0bbb
-
SHA256
3180329acbe4bef309498a65b0db0df853102257fdc3c71838c969289121f425
-
SHA512
eb13a2d5590aa20e426a8d93b27d57f467be9efe496a180d2c6c921597b6ed2b232a0e0c43dd451b377b356c2ffa22083062c67172b9f109d3efa87e31e6de42
-
SSDEEP
384:nlmFnqi0lJZtbH9KyM+2VzmiPZMsWerErAF+rMRTyN/0L+EcoinblneHQM3epzXW:lmSJ95M+2V6iqVe4rM+rMRa8NuMJt
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1