General
-
Target
e626dd6a23a90e2a7e6792020ee3fa20N
-
Size
23KB
-
Sample
240914-pf6b8sshql
-
MD5
e626dd6a23a90e2a7e6792020ee3fa20
-
SHA1
afe7bf6067c87013669fd905169be6fcf2ac0c12
-
SHA256
e6bfd08fca7a0f8ffcff6dcc4600a4b923cedd98de83af599670bfaeeba13c92
-
SHA512
638bace0d38ff6e50a2f4e1b234984a6423e1c8dc867e23b996f0bfa2781cb926e671fa9ba65a6183f746f06663374b26098acbd5cf096f2280872b36af6d999
-
SSDEEP
384:bluBPiZCMfdfSJrQbsLRGSIxYVL46fg/i8BD9BmRvR6JZlbw8hqIusZzZ0ZH:kOmhtIURpcnuZ
Behavioral task
behavioral1
Sample
e626dd6a23a90e2a7e6792020ee3fa20N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e626dd6a23a90e2a7e6792020ee3fa20N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
Lammer
server10-52663.portmap.host:52663
96e1a4795100058feca2324d7a804145
-
reg_key
96e1a4795100058feca2324d7a804145
-
splitter
|'|'|
Targets
-
-
Target
e626dd6a23a90e2a7e6792020ee3fa20N
-
Size
23KB
-
MD5
e626dd6a23a90e2a7e6792020ee3fa20
-
SHA1
afe7bf6067c87013669fd905169be6fcf2ac0c12
-
SHA256
e6bfd08fca7a0f8ffcff6dcc4600a4b923cedd98de83af599670bfaeeba13c92
-
SHA512
638bace0d38ff6e50a2f4e1b234984a6423e1c8dc867e23b996f0bfa2781cb926e671fa9ba65a6183f746f06663374b26098acbd5cf096f2280872b36af6d999
-
SSDEEP
384:bluBPiZCMfdfSJrQbsLRGSIxYVL46fg/i8BD9BmRvR6JZlbw8hqIusZzZ0ZH:kOmhtIURpcnuZ
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1