General
-
Target
Daxon.exe
-
Size
228KB
-
Sample
250112-x6lphswjcy
-
MD5
770e16a5bfc519bbeb406858ad8416be
-
SHA1
6adcfd39d8c6d7446597a2e1ea0fd6a549187fe8
-
SHA256
6f133792af0d3db042dcefea44d4976c3132791c86f2d84db4545fd56f17893e
-
SHA512
fdf0bae050c9a655e67e0e013e30ffe095dae3ead9cad9ac2f545b8f17c2441e68b02008e102b41f4ce281d4ef77445b896325d823ce3b2403c04c9d641deb0e
-
SSDEEP
3072:XtSUpBVpd2JE7Y8E/UJAP8rxLLnEHBAnpK37nXM8b0e+Q7RKPsR74tyJTN+KXB2E:4cVAE7YH/UJkmLD8B5KPC9BI9xAa
Static task
static1
Behavioral task
behavioral1
Sample
Daxon.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Daxon.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
Daxon.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Daxon.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
Daxon.exe
Resource
win11-20241007-en
Malware Config
Extracted
njrat
im523
HacKed by Daxon
daxon.giize.com:1111
07e96873111575b2cf8735ed61a4fb46
-
reg_key
07e96873111575b2cf8735ed61a4fb46
-
splitter
|'|'|
Targets
-
-
Target
Daxon.exe
-
Size
228KB
-
MD5
770e16a5bfc519bbeb406858ad8416be
-
SHA1
6adcfd39d8c6d7446597a2e1ea0fd6a549187fe8
-
SHA256
6f133792af0d3db042dcefea44d4976c3132791c86f2d84db4545fd56f17893e
-
SHA512
fdf0bae050c9a655e67e0e013e30ffe095dae3ead9cad9ac2f545b8f17c2441e68b02008e102b41f4ce281d4ef77445b896325d823ce3b2403c04c9d641deb0e
-
SSDEEP
3072:XtSUpBVpd2JE7Y8E/UJAP8rxLLnEHBAnpK37nXM8b0e+Q7RKPsR74tyJTN+KXB2E:4cVAE7YH/UJkmLD8B5KPC9BI9xAa
-
Njrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1