General

  • Target

    Bootstrapper.exe

  • Size

    37KB

  • Sample

    241201-2bmqjszlgk

  • MD5

    92fd66073b9a4f83ee5257d4dfc611fb

  • SHA1

    87377414dd581082a1e5d26633f2aa9838d26062

  • SHA256

    cbbd4d987c1f2368de89953f3d2ab06a803806faaab1d116d6c72cf11a93cbb2

  • SHA512

    f0e24cac627234e2556e7ce1b1634c32f0b17380850e3d956d35d6f92d1489dcad2fdcb799abbdf0d8169dff0d9c3da7a5672bf84899481368ed6909d6b19c95

  • SSDEEP

    768:Ob3MDF3lFdS7IVW5mae2rM+rMRa8Nuvyt:Ob6F3lPSUVW5op+gRJNE

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

boykisser

C2

eg-womens.gl.at.ply.gg:7999

Mutex

2be7fcfaf2fb2c0121ad0a1c26b16a25

Attributes
  • reg_key

    2be7fcfaf2fb2c0121ad0a1c26b16a25

  • splitter

    |'|'|

Targets

    • Target

      Bootstrapper.exe

    • Size

      37KB

    • MD5

      92fd66073b9a4f83ee5257d4dfc611fb

    • SHA1

      87377414dd581082a1e5d26633f2aa9838d26062

    • SHA256

      cbbd4d987c1f2368de89953f3d2ab06a803806faaab1d116d6c72cf11a93cbb2

    • SHA512

      f0e24cac627234e2556e7ce1b1634c32f0b17380850e3d956d35d6f92d1489dcad2fdcb799abbdf0d8169dff0d9c3da7a5672bf84899481368ed6909d6b19c95

    • SSDEEP

      768:Ob3MDF3lFdS7IVW5mae2rM+rMRa8Nuvyt:Ob6F3lPSUVW5op+gRJNE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks