General

  • Target

    Account bringer.exe

  • Size

    37KB

  • Sample

    241004-zkk7zavglj

  • MD5

    3cab82bd6de68242b990d5148df5f8d8

  • SHA1

    8fb73e69451431286a5fa1a87ea05d1a338e339a

  • SHA256

    2d3597e65ffbb0f3ba134e0bba9d8897488f9fee3a3c55090c19aafeb574a8e3

  • SHA512

    afbd8f6cde2212ff9ca45b9781dcf60c18478c2738cf0b86e9688d2ae16b78f1ee4dab7af19d7be9291fdb8851a33ec3388d301e248204d752968adc38ab30a9

  • SSDEEP

    384:l6RrDam6i/Cz3xAdjYWaSyFz1YXnC8W4LtDrAF+rMRTyN/0L+EcoinblneHQM3ec:cKaC6mNhFz1Yyd4ZrM+rMRa8NuhWt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

boykisser

C2

green-morrison.gl.at.ply.gg:17455

Mutex

d83001e08eed9b05d072435f5ca1e81c

Attributes
  • reg_key

    d83001e08eed9b05d072435f5ca1e81c

  • splitter

    |'|'|

Targets

    • Target

      Account bringer.exe

    • Size

      37KB

    • MD5

      3cab82bd6de68242b990d5148df5f8d8

    • SHA1

      8fb73e69451431286a5fa1a87ea05d1a338e339a

    • SHA256

      2d3597e65ffbb0f3ba134e0bba9d8897488f9fee3a3c55090c19aafeb574a8e3

    • SHA512

      afbd8f6cde2212ff9ca45b9781dcf60c18478c2738cf0b86e9688d2ae16b78f1ee4dab7af19d7be9291fdb8851a33ec3388d301e248204d752968adc38ab30a9

    • SSDEEP

      384:l6RrDam6i/Cz3xAdjYWaSyFz1YXnC8W4LtDrAF+rMRTyN/0L+EcoinblneHQM3ec:cKaC6mNhFz1Yyd4ZrM+rMRa8NuhWt

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks