General
-
Target
a653e4c1521fd408b227bc19b177c072dc2a094416818638df26a0237054fe7c.exe
-
Size
37KB
-
Sample
240927-yay6eayalh
-
MD5
9f7663bbbedf3509ef1d79c32b9886c6
-
SHA1
15d2091ec8efc4fe05f86472516f3ccedbcffda0
-
SHA256
a653e4c1521fd408b227bc19b177c072dc2a094416818638df26a0237054fe7c
-
SHA512
f8f6c5630950bde3f6af3f4282bfc3cb9182b7e6dbe2b822c793a1fdf0b87d30f9419814c9937bcf8b0b7ab491104273dd5df78aa5d3e30a33cc8c22729b4a9d
-
SSDEEP
384:BDCnFqi0fJZtbH9KyM+27zmAHPXs2A7qrAF+rMRTyN/0L+EcoinblneHQM3epzXv:UoJ95M+276AvtAurM+rMRa8NunMhMt
Behavioral task
behavioral1
Sample
a653e4c1521fd408b227bc19b177c072dc2a094416818638df26a0237054fe7c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a653e4c1521fd408b227bc19b177c072dc2a094416818638df26a0237054fe7c.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
HacKed By KiLLeR
killerfo22.ddns.net:1177
0ff598d62c6af797fc0d9c7cb85c8987
-
reg_key
0ff598d62c6af797fc0d9c7cb85c8987
-
splitter
|'|'|
Targets
-
-
Target
a653e4c1521fd408b227bc19b177c072dc2a094416818638df26a0237054fe7c.exe
-
Size
37KB
-
MD5
9f7663bbbedf3509ef1d79c32b9886c6
-
SHA1
15d2091ec8efc4fe05f86472516f3ccedbcffda0
-
SHA256
a653e4c1521fd408b227bc19b177c072dc2a094416818638df26a0237054fe7c
-
SHA512
f8f6c5630950bde3f6af3f4282bfc3cb9182b7e6dbe2b822c793a1fdf0b87d30f9419814c9937bcf8b0b7ab491104273dd5df78aa5d3e30a33cc8c22729b4a9d
-
SSDEEP
384:BDCnFqi0fJZtbH9KyM+27zmAHPXs2A7qrAF+rMRTyN/0L+EcoinblneHQM3epzXv:UoJ95M+276AvtAurM+rMRa8NunMhMt
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1