General
-
Target
SteamDetector.exe
-
Size
215KB
-
Sample
250123-grflyswkcw
-
MD5
c7bb7b93bc4327b0190c852138cc4f0c
-
SHA1
af779bc979d9d4515510b60511ef14d1d3331f47
-
SHA256
bcb6f8e7702380c8f2eec6393a4a4d414027d75786593072e524aef7f4d232cd
-
SHA512
56a4fe9007421e2a0a0afbfc12d1b3fa8544ff71986282292608966725e2a436b751fc4aa7a7bb99a0dfe50aada7419c4450d01dd94ac78251ab8ce33d432d55
-
SSDEEP
1536:56N9uMvWCo+gRJNQkZqH5u3JPyaoBypISq8JhrCdupRKV:567ukc+yJSkA5u3JPn++rq8JhudupRK
Behavioral task
behavioral1
Sample
SteamDetector.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SteamDetector.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
127.0.0.1:5552
46422e05e6e5062fec6d0ab906669fb9
-
reg_key
46422e05e6e5062fec6d0ab906669fb9
-
splitter
|'|'|
Targets
-
-
Target
SteamDetector.exe
-
Size
215KB
-
MD5
c7bb7b93bc4327b0190c852138cc4f0c
-
SHA1
af779bc979d9d4515510b60511ef14d1d3331f47
-
SHA256
bcb6f8e7702380c8f2eec6393a4a4d414027d75786593072e524aef7f4d232cd
-
SHA512
56a4fe9007421e2a0a0afbfc12d1b3fa8544ff71986282292608966725e2a436b751fc4aa7a7bb99a0dfe50aada7419c4450d01dd94ac78251ab8ce33d432d55
-
SSDEEP
1536:56N9uMvWCo+gRJNQkZqH5u3JPyaoBypISq8JhrCdupRKV:567ukc+yJSkA5u3JPn++rq8JhudupRK
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1