General

  • Target

    Account bringer.exe

  • Size

    37KB

  • Sample

    241004-zqay7awapk

  • MD5

    eeb601facc0d8fb2a1f99748a9c1bccc

  • SHA1

    f505469bc80423961f562039b8c7684d747256d0

  • SHA256

    ea2b3ce2d79e8baec69d00906beebda114ffba267f5156470db27ed26a264a28

  • SHA512

    a05113c264677d75354b64cc5249355224708ce657689967cf411e72f42ebdfd4fd82c63cfdf25405c37313634cd4a60cb7acbc6b2541691618a17b5249f4e40

  • SSDEEP

    384:O6Rrkam6i/Cz3xAdjYWaSyFz1YXnC8W4Lt6rAF+rMRTyN/0L+EcoinblneHQM3ek:bfaC6mNhFz1Yyd4ErM+rMRa8Nuhat

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

boykisser

C2

green-morrison.gl.at.ply.gg:17455

Mutex

d83001e08eed9b05d072435f5ca1e81c

Attributes
  • reg_key

    d83001e08eed9b05d072435f5ca1e81c

  • splitter

    |'|'|

Targets

    • Target

      Account bringer.exe

    • Size

      37KB

    • MD5

      eeb601facc0d8fb2a1f99748a9c1bccc

    • SHA1

      f505469bc80423961f562039b8c7684d747256d0

    • SHA256

      ea2b3ce2d79e8baec69d00906beebda114ffba267f5156470db27ed26a264a28

    • SHA512

      a05113c264677d75354b64cc5249355224708ce657689967cf411e72f42ebdfd4fd82c63cfdf25405c37313634cd4a60cb7acbc6b2541691618a17b5249f4e40

    • SSDEEP

      384:O6Rrkam6i/Cz3xAdjYWaSyFz1YXnC8W4Lt6rAF+rMRTyN/0L+EcoinblneHQM3ek:bfaC6mNhFz1Yyd4ErM+rMRa8Nuhat

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks