General
-
Target
6e6d4fc9df4cbbe2aa3891448cd2bb7dd5f0bfb4396f6c76ed794292cebac387N
-
Size
37KB
-
Sample
241022-h4tvsawamq
-
MD5
2ab5d8c77b69c83b4586327b4e5b1ac0
-
SHA1
4bb9f0235b34646e144a737b4411bf8b9b54fa84
-
SHA256
6e6d4fc9df4cbbe2aa3891448cd2bb7dd5f0bfb4396f6c76ed794292cebac387
-
SHA512
370895216cf89f160fb7b8a8413b820a91b6bad1b4073648418f31ed39a3d55476564bf0809ac28cc7e041eaf1fbe7a08b1a28aafd2dd8624e1c638013ade608
-
SSDEEP
384:EuOIiu/jtD+P3V+y0bFwRktv7ms2cPPrAF+rMRTyN/0L+EcoinblneHQM3epzXeG:xXmV10bFwRktalc3rM+rMRa8NuQ5st
Behavioral task
behavioral1
Sample
6e6d4fc9df4cbbe2aa3891448cd2bb7dd5f0bfb4396f6c76ed794292cebac387N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e6d4fc9df4cbbe2aa3891448cd2bb7dd5f0bfb4396f6c76ed794292cebac387N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
127.0.0.1:5552
530243754b22224b529f98e07e5b54cd
-
reg_key
530243754b22224b529f98e07e5b54cd
-
splitter
|'|'|
Targets
-
-
Target
6e6d4fc9df4cbbe2aa3891448cd2bb7dd5f0bfb4396f6c76ed794292cebac387N
-
Size
37KB
-
MD5
2ab5d8c77b69c83b4586327b4e5b1ac0
-
SHA1
4bb9f0235b34646e144a737b4411bf8b9b54fa84
-
SHA256
6e6d4fc9df4cbbe2aa3891448cd2bb7dd5f0bfb4396f6c76ed794292cebac387
-
SHA512
370895216cf89f160fb7b8a8413b820a91b6bad1b4073648418f31ed39a3d55476564bf0809ac28cc7e041eaf1fbe7a08b1a28aafd2dd8624e1c638013ade608
-
SSDEEP
384:EuOIiu/jtD+P3V+y0bFwRktv7ms2cPPrAF+rMRTyN/0L+EcoinblneHQM3epzXeG:xXmV10bFwRktalc3rM+rMRa8NuQ5st
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1