General
-
Target
DisableWDv1.bat
-
Size
664B
-
Sample
250108-2g3nysyngn
-
MD5
d5ae652c3c0c4ed6269743dbfb5ce953
-
SHA1
43a8888f001b9b7e2629746848f2a1601acb60f2
-
SHA256
bc29f3e495e73cab8b5cc4b63d0048109fe3f33f3d209939a279053d4091448e
-
SHA512
2d05a38a154adfba0b2e6d0ff38a6c3e21b6f0ec840f5618bee6b06836aef255cf98d4ad578cedf4a49955fa1cb0c4d3255c028a47fd83dcc6af1e20b62e9499
Static task
static1
Behavioral task
behavioral1
Sample
DisableWDv1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
DisableWDv1.bat
Resource
win11-20241007-en
Malware Config
Extracted
https://raw.githubusercontent.com/pebiko70/test/main/Server.exe
Extracted
njrat
im523
HacKed
financial-amanda.gl.at.ply.gg:47287
023b6c1e71ec3df384e0804152feb1fe
-
reg_key
023b6c1e71ec3df384e0804152feb1fe
-
splitter
|'|'|
Targets
-
-
Target
DisableWDv1.bat
-
Size
664B
-
MD5
d5ae652c3c0c4ed6269743dbfb5ce953
-
SHA1
43a8888f001b9b7e2629746848f2a1601acb60f2
-
SHA256
bc29f3e495e73cab8b5cc4b63d0048109fe3f33f3d209939a279053d4091448e
-
SHA512
2d05a38a154adfba0b2e6d0ff38a6c3e21b6f0ec840f5618bee6b06836aef255cf98d4ad578cedf4a49955fa1cb0c4d3255c028a47fd83dcc6af1e20b62e9499
-
Njrat family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1