General
-
Target
34f7f28ba032182b6791f6715af122c721f8faf65abeebc4916b75d92b4525a2
-
Size
523KB
-
Sample
241018-xwbfsstdmf
-
MD5
8303fbef6e3918300a97bdce8f902dac
-
SHA1
a7aab55f0753fd4ab2961c21abd3eddf27acc8f2
-
SHA256
34f7f28ba032182b6791f6715af122c721f8faf65abeebc4916b75d92b4525a2
-
SHA512
f3e4dcf49b712e067af05eb34fe7d5c56c1b879da32e98cdae8f02a1cd60d3b2415c9723051129995e65dbd54a683a11f3079e47b1bd50a9e32941da426cea39
-
SSDEEP
12288:dToPWBv/cpGrU3y/S9U7DzInZEiQIG/V/1WkRZ4p3nq6:dTbBv5rUQDzIntQIIF47
Static task
static1
Behavioral task
behavioral1
Sample
34f7f28ba032182b6791f6715af122c721f8faf65abeebc4916b75d92b4525a2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
34f7f28ba032182b6791f6715af122c721f8faf65abeebc4916b75d92b4525a2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
172.29.192.1:7733
af8521d58cef2cc5d6031d0e5bd8a950
-
reg_key
af8521d58cef2cc5d6031d0e5bd8a950
-
splitter
|'|'|
Targets
-
-
Target
34f7f28ba032182b6791f6715af122c721f8faf65abeebc4916b75d92b4525a2
-
Size
523KB
-
MD5
8303fbef6e3918300a97bdce8f902dac
-
SHA1
a7aab55f0753fd4ab2961c21abd3eddf27acc8f2
-
SHA256
34f7f28ba032182b6791f6715af122c721f8faf65abeebc4916b75d92b4525a2
-
SHA512
f3e4dcf49b712e067af05eb34fe7d5c56c1b879da32e98cdae8f02a1cd60d3b2415c9723051129995e65dbd54a683a11f3079e47b1bd50a9e32941da426cea39
-
SSDEEP
12288:dToPWBv/cpGrU3y/S9U7DzInZEiQIG/V/1WkRZ4p3nq6:dTbBv5rUQDzIntQIIF47
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1