General

  • Target

    Windows Defender.exe

  • Size

    37KB

  • Sample

    240828-maax2awdrn

  • MD5

    28c34462b329ac7b19cac4d88a9e74c9

  • SHA1

    be8d25ae104c5d3f96644bd9c7d080ce11845ea6

  • SHA256

    1f09b41bcae8bf672ec316a74835ca714d25ad6dd34fcddc76499213172c5170

  • SHA512

    8aec349d85b4e50ca0598f8d12a2eb1f41636845957d6f6470b64428a508928ab7f1d9e6e91b15383bfa45d6ab8c3139038c44eb79efa33fd65d2742fe687656

  • SSDEEP

    768:Dkj8nAwJvtPrbAAgC43rM+rMRa8NuUCt:DkwAwJ1DUAmo+gRJNj

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

boykisser

C2

green-morrison.gl.at.ply.gg:8080

Mutex

f1537b79cbf5c68003321af22fe396df

Attributes
  • reg_key

    f1537b79cbf5c68003321af22fe396df

  • splitter

    |'|'|

Targets

    • Target

      Windows Defender.exe

    • Size

      37KB

    • MD5

      28c34462b329ac7b19cac4d88a9e74c9

    • SHA1

      be8d25ae104c5d3f96644bd9c7d080ce11845ea6

    • SHA256

      1f09b41bcae8bf672ec316a74835ca714d25ad6dd34fcddc76499213172c5170

    • SHA512

      8aec349d85b4e50ca0598f8d12a2eb1f41636845957d6f6470b64428a508928ab7f1d9e6e91b15383bfa45d6ab8c3139038c44eb79efa33fd65d2742fe687656

    • SSDEEP

      768:Dkj8nAwJvtPrbAAgC43rM+rMRa8NuUCt:DkwAwJ1DUAmo+gRJNj

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks