General
-
Target
fbef397f7b9e59defe5c9dda20598ea1e61c50b515c067f16fb353765beb8516.zip
-
Size
11.7MB
-
Sample
241021-f4xkkasfmk
-
MD5
8ec7644b9f1cd06aa2d9bd7a3ea77c6c
-
SHA1
db159b46543b044cb018a75d31e3852883b0ae0e
-
SHA256
b6c6fb881fb37b9f3b55a0471cb844ad2001ceb8ddd82aebf24074309ccd795d
-
SHA512
81766dfb9360783d373df8c2e73f148f3e44fa06035033f314da455f2c4c693d1ac0b98374aa5a63df6c9be29260abeb9b3393e922f27f34dd5194f556e273f9
-
SSDEEP
196608:DsgzutpVodmsy17g2fujIRuDO0baickpbRYzmBx8nV/83GJrs6glYwLADc5Oz+n:OqWh2sRuD1GcpUG6rs6RDc5Oz+n
Behavioral task
behavioral1
Sample
fbef397f7b9e59defe5c9dda20598ea1e61c50b515c067f16fb353765beb8516.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbef397f7b9e59defe5c9dda20598ea1e61c50b515c067f16fb353765beb8516.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.6.4
baslayalim
91.92.242.187:1339
46f87cb2b7a37b42307390e98359779e
-
reg_key
46f87cb2b7a37b42307390e98359779e
-
splitter
|'|'|
Targets
-
-
Target
fbef397f7b9e59defe5c9dda20598ea1e61c50b515c067f16fb353765beb8516
-
Size
20.7MB
-
MD5
1c26f1a4ee0ee14a776f10eff0a7f652
-
SHA1
776be5867732f91bdf587420e87ea3ccea075dc5
-
SHA256
fbef397f7b9e59defe5c9dda20598ea1e61c50b515c067f16fb353765beb8516
-
SHA512
5b9675a48ca762262afe062cd46b3d2e996e8d13bd80bb1107b3a33995a217b87ba3ab3a6e82eae3ac36f745ab5f5b5f56e36c01fdf2fd79c6b6f9c52d0eb5a8
-
SSDEEP
196608:DgRrd4rYBFH179k3qxnWcdoT+u0XRZTdbQguI8gh833xxaMfYky:0FH1yuW/+tdSI8ge3Ly
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3