General
-
Target
2545b47e98ffb00e68912dbedcb8f5db.exe
-
Size
93KB
-
Sample
241001-ywkj5ssaqh
-
MD5
2545b47e98ffb00e68912dbedcb8f5db
-
SHA1
0612d0f4417ebb63e52ad1da47db3209e848332a
-
SHA256
18240be396f8b7a2a28669dfb20f4fb311daf0b1fd4c1d81df26d7f8419444d4
-
SHA512
d480f7713618938a6239445c4e5ccdbdc1305fa3d45e958d7b4656cee09e792ad5892e18c0c590f2aa9c2e904f00a271fbbb8da5db3d14846a9819ba5cba7788
-
SSDEEP
1536:jwfR8lZc+/2HK1j+fzdljEwzGi1dDaDlgS:jwfKc+/2HK1ozdSi1dMy
Behavioral task
behavioral1
Sample
2545b47e98ffb00e68912dbedcb8f5db.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2545b47e98ffb00e68912dbedcb8f5db.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
SQWICK
hakim32.ddns.net:2000
5.tcp.eu.ngrok.io:14355
32cf646479fb52a6cecce80a3bf8d7de
-
reg_key
32cf646479fb52a6cecce80a3bf8d7de
-
splitter
|'|'|
Targets
-
-
Target
2545b47e98ffb00e68912dbedcb8f5db.exe
-
Size
93KB
-
MD5
2545b47e98ffb00e68912dbedcb8f5db
-
SHA1
0612d0f4417ebb63e52ad1da47db3209e848332a
-
SHA256
18240be396f8b7a2a28669dfb20f4fb311daf0b1fd4c1d81df26d7f8419444d4
-
SHA512
d480f7713618938a6239445c4e5ccdbdc1305fa3d45e958d7b4656cee09e792ad5892e18c0c590f2aa9c2e904f00a271fbbb8da5db3d14846a9819ba5cba7788
-
SSDEEP
1536:jwfR8lZc+/2HK1j+fzdljEwzGi1dDaDlgS:jwfKc+/2HK1ozdSi1dMy
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1