General

  • Target

    Account bringer.exe

  • Size

    37KB

  • Sample

    241005-xsdfzszcjl

  • MD5

    fc04578c59cd41466d533cbcd7157282

  • SHA1

    201be3e8474ca4bfe58fd5761ea62c42645d7fd0

  • SHA256

    611fe530fb6e67415f6a5ed53e1961180fcb89bb1caab4fed64feab511a89813

  • SHA512

    6c661d6c05e7729a1f4abd869b2e5b24cf2b0393f65d6e36c3f7c34502dd02f91b414cc08809a12209d7decd8a2250939f4f1ba7430e472e515a4f7816340f2b

  • SSDEEP

    768:fb3MDF3lFdS7IVW5maePrM+rMRa8Nuv/t:fb6F3lPSUVW5oQ+gRJNE

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

boykisser

C2

eg-womens.gl.at.ply.gg:7999

Mutex

2be7fcfaf2fb2c0121ad0a1c26b16a25

Attributes
  • reg_key

    2be7fcfaf2fb2c0121ad0a1c26b16a25

  • splitter

    |'|'|

Targets

    • Target

      Account bringer.exe

    • Size

      37KB

    • MD5

      fc04578c59cd41466d533cbcd7157282

    • SHA1

      201be3e8474ca4bfe58fd5761ea62c42645d7fd0

    • SHA256

      611fe530fb6e67415f6a5ed53e1961180fcb89bb1caab4fed64feab511a89813

    • SHA512

      6c661d6c05e7729a1f4abd869b2e5b24cf2b0393f65d6e36c3f7c34502dd02f91b414cc08809a12209d7decd8a2250939f4f1ba7430e472e515a4f7816340f2b

    • SSDEEP

      768:fb3MDF3lFdS7IVW5maePrM+rMRa8Nuv/t:fb6F3lPSUVW5oQ+gRJNE

    • Modifies Windows Defender Real-time Protection settings

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Modifies file permissions

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks