General
-
Target
Account bringer.exe
-
Size
37KB
-
Sample
241004-zkk7zavglj
-
MD5
3cab82bd6de68242b990d5148df5f8d8
-
SHA1
8fb73e69451431286a5fa1a87ea05d1a338e339a
-
SHA256
2d3597e65ffbb0f3ba134e0bba9d8897488f9fee3a3c55090c19aafeb574a8e3
-
SHA512
afbd8f6cde2212ff9ca45b9781dcf60c18478c2738cf0b86e9688d2ae16b78f1ee4dab7af19d7be9291fdb8851a33ec3388d301e248204d752968adc38ab30a9
-
SSDEEP
384:l6RrDam6i/Cz3xAdjYWaSyFz1YXnC8W4LtDrAF+rMRTyN/0L+EcoinblneHQM3ec:cKaC6mNhFz1Yyd4ZrM+rMRa8NuhWt
Behavioral task
behavioral1
Sample
Account bringer.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
boykisser
green-morrison.gl.at.ply.gg:17455
d83001e08eed9b05d072435f5ca1e81c
-
reg_key
d83001e08eed9b05d072435f5ca1e81c
-
splitter
|'|'|
Targets
-
-
Target
Account bringer.exe
-
Size
37KB
-
MD5
3cab82bd6de68242b990d5148df5f8d8
-
SHA1
8fb73e69451431286a5fa1a87ea05d1a338e339a
-
SHA256
2d3597e65ffbb0f3ba134e0bba9d8897488f9fee3a3c55090c19aafeb574a8e3
-
SHA512
afbd8f6cde2212ff9ca45b9781dcf60c18478c2738cf0b86e9688d2ae16b78f1ee4dab7af19d7be9291fdb8851a33ec3388d301e248204d752968adc38ab30a9
-
SSDEEP
384:l6RrDam6i/Cz3xAdjYWaSyFz1YXnC8W4LtDrAF+rMRTyN/0L+EcoinblneHQM3ec:cKaC6mNhFz1Yyd4ZrM+rMRa8NuhWt
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1