General
-
Target
634a5e24eda00b716c30b8c463f811a3d0d413a8e0e1e02b1bb2518be225ddcd.exe
-
Size
37KB
-
Sample
240928-jyzphsxfkh
-
MD5
5e16a3eac79835659433ec179b8ed4ef
-
SHA1
32767a796ce2d207df6f6a6b70bf58da4e3dac19
-
SHA256
634a5e24eda00b716c30b8c463f811a3d0d413a8e0e1e02b1bb2518be225ddcd
-
SHA512
37be7905e591f050fb442ede75bcb451e504744bee9b58e6d21d9a3ba6b509d2ea4d3fa107645ff5ef7a6cdd53d900f42c404d2146491d4446d2f728228f33f9
-
SSDEEP
384:7D1qiU954NLHdayszXlKvhbsmmk8rAF+rMRTyN/0L+EcoinblneHQM3epzXlNrnz:XXZdJszXlKxFmZrM+rMRa8Nuzvt
Behavioral task
behavioral1
Sample
634a5e24eda00b716c30b8c463f811a3d0d413a8e0e1e02b1bb2518be225ddcd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
634a5e24eda00b716c30b8c463f811a3d0d413a8e0e1e02b1bb2518be225ddcd.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
HacKed PUBG
cantburn.hopto.org:1177
7b5444a8f8ca9a359aadb891c7e9f01b
-
reg_key
7b5444a8f8ca9a359aadb891c7e9f01b
-
splitter
|'|'|
Targets
-
-
Target
634a5e24eda00b716c30b8c463f811a3d0d413a8e0e1e02b1bb2518be225ddcd.exe
-
Size
37KB
-
MD5
5e16a3eac79835659433ec179b8ed4ef
-
SHA1
32767a796ce2d207df6f6a6b70bf58da4e3dac19
-
SHA256
634a5e24eda00b716c30b8c463f811a3d0d413a8e0e1e02b1bb2518be225ddcd
-
SHA512
37be7905e591f050fb442ede75bcb451e504744bee9b58e6d21d9a3ba6b509d2ea4d3fa107645ff5ef7a6cdd53d900f42c404d2146491d4446d2f728228f33f9
-
SSDEEP
384:7D1qiU954NLHdayszXlKvhbsmmk8rAF+rMRTyN/0L+EcoinblneHQM3epzXlNrnz:XXZdJszXlKxFmZrM+rMRa8Nuzvt
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1