General
-
Target
9a93e284738593ec18d5e0c7d23de3a798a2fb7948aa730243edb5fd3566fc3c
-
Size
509KB
-
Sample
240915-adhqtsvcjr
-
MD5
093b753a23c9e8d075a0b5930becc5db
-
SHA1
1702c0e879306d86a5a66291da6318581df63f1d
-
SHA256
9a93e284738593ec18d5e0c7d23de3a798a2fb7948aa730243edb5fd3566fc3c
-
SHA512
e948a28961872ea1b64cafcd0190cc2d85cac5d887b94d4a8eefc24374ca1581c6c9882c6000cea9c6c507b14be6c4f2191118e3aa76cfdb7992d4f5aab11cf2
-
SSDEEP
6144:BstlOOo8x7n59Z+zyu65QnlQBD57PSNfL:wOOfN590uu6ekV7PSNz
Static task
static1
Behavioral task
behavioral1
Sample
9a93e284738593ec18d5e0c7d23de3a798a2fb7948aa730243edb5fd3566fc3c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9a93e284738593ec18d5e0c7d23de3a798a2fb7948aa730243edb5fd3566fc3c.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
Loh
4.tcp.ngrok.io:15397
e3a79ad10724ea5246684eaecb0cb4a0
-
reg_key
e3a79ad10724ea5246684eaecb0cb4a0
-
splitter
|'|'|
Targets
-
-
Target
9a93e284738593ec18d5e0c7d23de3a798a2fb7948aa730243edb5fd3566fc3c
-
Size
509KB
-
MD5
093b753a23c9e8d075a0b5930becc5db
-
SHA1
1702c0e879306d86a5a66291da6318581df63f1d
-
SHA256
9a93e284738593ec18d5e0c7d23de3a798a2fb7948aa730243edb5fd3566fc3c
-
SHA512
e948a28961872ea1b64cafcd0190cc2d85cac5d887b94d4a8eefc24374ca1581c6c9882c6000cea9c6c507b14be6c4f2191118e3aa76cfdb7992d4f5aab11cf2
-
SSDEEP
6144:BstlOOo8x7n59Z+zyu65QnlQBD57PSNfL:wOOfN590uu6ekV7PSNz
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1