General
-
Target
Windows Defender.exe
-
Size
37KB
-
Sample
240828-mbbwqavape
-
MD5
f183956bfef428d2010b67e7cf5fdb7f
-
SHA1
0b3bd6da13ef9394da1cb11152f2ce62873ae165
-
SHA256
87a799098b81bf8dd35f62c3f40e6a5ba73adb7d551446ba36c4e37a8ab46431
-
SHA512
57fa6282fa518cb66185eb1fa62ac49489b03aa1df5c2c241398c300ffed929e0843ce1199b9184236359b5bad8ec2a610847ee69087deb2a0b6719ea15889ef
-
SSDEEP
384:z6Rrkam6i/Cz3xAdjYWaSyFz1YXnC8W4Lt6rAF+rMRTyN/0L+EcoinblneHQM3eU:OfaC6mNhFz1Yyd4ErM+rMRa8Nuhit
Behavioral task
behavioral1
Sample
Windows Defender.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
boykisser
green-morrison.gl.at.ply.gg:17455
d83001e08eed9b05d072435f5ca1e81c
-
reg_key
d83001e08eed9b05d072435f5ca1e81c
-
splitter
|'|'|
Targets
-
-
Target
Windows Defender.exe
-
Size
37KB
-
MD5
f183956bfef428d2010b67e7cf5fdb7f
-
SHA1
0b3bd6da13ef9394da1cb11152f2ce62873ae165
-
SHA256
87a799098b81bf8dd35f62c3f40e6a5ba73adb7d551446ba36c4e37a8ab46431
-
SHA512
57fa6282fa518cb66185eb1fa62ac49489b03aa1df5c2c241398c300ffed929e0843ce1199b9184236359b5bad8ec2a610847ee69087deb2a0b6719ea15889ef
-
SSDEEP
384:z6Rrkam6i/Cz3xAdjYWaSyFz1YXnC8W4Lt6rAF+rMRTyN/0L+EcoinblneHQM3eU:OfaC6mNhFz1Yyd4ErM+rMRa8Nuhit
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1