General
-
Target
ecbd6b6eb454ce86d7e6ab1ca22f8919f6b595193d2f04e093dcf4c90b8d0d12N
-
Size
135KB
-
Sample
240917-3wq45s1fqd
-
MD5
33bf20431181a09f3f1ec1aae1d69da0
-
SHA1
aa1e9893361614bb82b3a1a8a94a84b8970da674
-
SHA256
ecbd6b6eb454ce86d7e6ab1ca22f8919f6b595193d2f04e093dcf4c90b8d0d12
-
SHA512
92fd38965c19daefaac896280e861c85652e4e227ad47a860ddc4a2f7c6cd3b489b9020ca38e627b813bc8bf7755c9f1d561490c228914e774aebbcefe46fbd9
-
SSDEEP
3072:xVq7Ganmup+nXhrn+FuKqCg/DREWU+gZCo5:LSmfnXhT+VqCgdfUvZN5
Static task
static1
Behavioral task
behavioral1
Sample
ecbd6b6eb454ce86d7e6ab1ca22f8919f6b595193d2f04e093dcf4c90b8d0d12N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecbd6b6eb454ce86d7e6ab1ca22f8919f6b595193d2f04e093dcf4c90b8d0d12N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
chrome
147.185.221.21:43492
408747fd467c7d10dbd55bb8e0781708
-
reg_key
408747fd467c7d10dbd55bb8e0781708
-
splitter
|'|'|
Targets
-
-
Target
ecbd6b6eb454ce86d7e6ab1ca22f8919f6b595193d2f04e093dcf4c90b8d0d12N
-
Size
135KB
-
MD5
33bf20431181a09f3f1ec1aae1d69da0
-
SHA1
aa1e9893361614bb82b3a1a8a94a84b8970da674
-
SHA256
ecbd6b6eb454ce86d7e6ab1ca22f8919f6b595193d2f04e093dcf4c90b8d0d12
-
SHA512
92fd38965c19daefaac896280e861c85652e4e227ad47a860ddc4a2f7c6cd3b489b9020ca38e627b813bc8bf7755c9f1d561490c228914e774aebbcefe46fbd9
-
SSDEEP
3072:xVq7Ganmup+nXhrn+FuKqCg/DREWU+gZCo5:LSmfnXhT+VqCgdfUvZN5
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1