General
-
Target
Explower.exe
-
Size
93KB
-
Sample
240917-k79fravfkf
-
MD5
ba5e37504c00524408acfb6ccb306276
-
SHA1
dd5ea510df34f3ef5ca7cd022e69556b3517fbe1
-
SHA256
ce2ab23a027755be79f00183835b8f709f2be1cfbd25013dfe6467eb89c13df3
-
SHA512
1097a402f5b4db2e9a3496eff74773413a73c7474e105ab5ce59a23feafaf388431366def5fe90eb04e7587a9f0cae4a5d83c0bd59f1c64447b8e476c8af82dc
-
SSDEEP
768:3Y37MMLUiu5LVMZASgeArRKm6t0XJmYm6naeG+KXxrjEtCdnl2pi1Rz4Rk3JsGdG:5MLputRe2Rx6k9ab9jEwzGi1dD5DygS
Behavioral task
behavioral1
Sample
Explower.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Explower.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
Explower.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Explower.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Explower.exe
Resource
win11-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
release-oakland.gl.at.ply.gg:45463
0164d5d5cbab440fb768d095d7f279d3
-
reg_key
0164d5d5cbab440fb768d095d7f279d3
-
splitter
|'|'|
Targets
-
-
Target
Explower.exe
-
Size
93KB
-
MD5
ba5e37504c00524408acfb6ccb306276
-
SHA1
dd5ea510df34f3ef5ca7cd022e69556b3517fbe1
-
SHA256
ce2ab23a027755be79f00183835b8f709f2be1cfbd25013dfe6467eb89c13df3
-
SHA512
1097a402f5b4db2e9a3496eff74773413a73c7474e105ab5ce59a23feafaf388431366def5fe90eb04e7587a9f0cae4a5d83c0bd59f1c64447b8e476c8af82dc
-
SSDEEP
768:3Y37MMLUiu5LVMZASgeArRKm6t0XJmYm6naeG+KXxrjEtCdnl2pi1Rz4Rk3JsGdG:5MLputRe2Rx6k9ab9jEwzGi1dD5DygS
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1