General
-
Target
Account bringer.exe
-
Size
37KB
-
Sample
241005-xsdfzszcjl
-
MD5
fc04578c59cd41466d533cbcd7157282
-
SHA1
201be3e8474ca4bfe58fd5761ea62c42645d7fd0
-
SHA256
611fe530fb6e67415f6a5ed53e1961180fcb89bb1caab4fed64feab511a89813
-
SHA512
6c661d6c05e7729a1f4abd869b2e5b24cf2b0393f65d6e36c3f7c34502dd02f91b414cc08809a12209d7decd8a2250939f4f1ba7430e472e515a4f7816340f2b
-
SSDEEP
768:fb3MDF3lFdS7IVW5maePrM+rMRa8Nuv/t:fb6F3lPSUVW5oQ+gRJNE
Behavioral task
behavioral1
Sample
Account bringer.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
boykisser
eg-womens.gl.at.ply.gg:7999
2be7fcfaf2fb2c0121ad0a1c26b16a25
-
reg_key
2be7fcfaf2fb2c0121ad0a1c26b16a25
-
splitter
|'|'|
Targets
-
-
Target
Account bringer.exe
-
Size
37KB
-
MD5
fc04578c59cd41466d533cbcd7157282
-
SHA1
201be3e8474ca4bfe58fd5761ea62c42645d7fd0
-
SHA256
611fe530fb6e67415f6a5ed53e1961180fcb89bb1caab4fed64feab511a89813
-
SHA512
6c661d6c05e7729a1f4abd869b2e5b24cf2b0393f65d6e36c3f7c34502dd02f91b414cc08809a12209d7decd8a2250939f4f1ba7430e472e515a4f7816340f2b
-
SSDEEP
768:fb3MDF3lFdS7IVW5maePrM+rMRa8Nuv/t:fb6F3lPSUVW5oQ+gRJNE
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Modifies file permissions
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2