General
-
Target
DisableWDv1.bat
-
Size
872B
-
Sample
250108-1q112sxmfk
-
MD5
7e36cba08cf2f7556651430989871ed3
-
SHA1
77cdb81c4081e6f3e3dd295738e6b0f128e414d9
-
SHA256
b40994ebf386e60512bb433bd2d59505dbe20c985a04772eb6c4bf65d2511e3a
-
SHA512
4cb8cae10769147c6e957d6c185520fd2663a87e55c1f332219cde1b877f915b29b278700d31d676276eb2d34f11aa1b1a34d5fb37cf47c8511bc00058deb924
Static task
static1
Behavioral task
behavioral1
Sample
DisableWDv1.bat
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
DisableWDv1.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://raw.githubusercontent.com/pebiko70/test/main/Server.exe
Extracted
njrat
im523
HacKed
financial-amanda.gl.at.ply.gg:47287
023b6c1e71ec3df384e0804152feb1fe
-
reg_key
023b6c1e71ec3df384e0804152feb1fe
-
splitter
|'|'|
Targets
-
-
Target
DisableWDv1.bat
-
Size
872B
-
MD5
7e36cba08cf2f7556651430989871ed3
-
SHA1
77cdb81c4081e6f3e3dd295738e6b0f128e414d9
-
SHA256
b40994ebf386e60512bb433bd2d59505dbe20c985a04772eb6c4bf65d2511e3a
-
SHA512
4cb8cae10769147c6e957d6c185520fd2663a87e55c1f332219cde1b877f915b29b278700d31d676276eb2d34f11aa1b1a34d5fb37cf47c8511bc00058deb924
-
Njrat family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1