Overview
overview
10Static
static
10lmlmdos.exe
windows11-21h2-x64
lmlmdos.exe
windows7-x64
lmlmdos.exe
windows10-2004-x64
lmlmdos.exe
windows10-ltsc 2021-x64
10lmlmdos.exe
windows11-21h2-x64
10lmlmdos.exe
macos-10.15-amd64
1lmlmdos.exe
macos-10.15-amd64
4lmlmdos.exe
ubuntu-22.04-amd64
lmlmdos.exe
ubuntu-24.04-amd64
General
-
Target
lmlmdos.exe
-
Size
23KB
-
Sample
250208-j8kncawkhm
-
MD5
5eb67cac2f9ef8a548ba327896909cda
-
SHA1
b8f3612f2d00c581387b02a615ad178874b51329
-
SHA256
f5c542679e18756fcaaf434a1df9ecee261c8fa6788b75dc64c458e4eef15f2d
-
SHA512
40665518a5451f7bd86ca1e3ad58cec178566c0f45fde647e76c2bb8d81611ca61fe1974cb97988065239005ca63fc9de0c449d45357ee90a8a99ccd30a5415f
-
SSDEEP
384:XweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZQy:oLq411eRpcnuI
Behavioral task
behavioral1
Sample
lmlmdos.exe
Resource
win11-20250207-es
Behavioral task
behavioral2
Sample
lmlmdos.exe
Resource
win7-20241010-es
Behavioral task
behavioral3
Sample
lmlmdos.exe
Resource
win10v2004-20250207-es
Behavioral task
behavioral4
Sample
lmlmdos.exe
Resource
win10ltsc2021-20250207-es
Behavioral task
behavioral5
Sample
lmlmdos.exe
Resource
win11-20250207-es
Behavioral task
behavioral6
Sample
lmlmdos.exe
Resource
macos-20241106-es
Behavioral task
behavioral7
Sample
lmlmdos.exe
Resource
macos-20241101-es
Behavioral task
behavioral8
Sample
lmlmdos.exe
Resource
ubuntu2204-amd64-20240611-es
Behavioral task
behavioral9
Sample
lmlmdos.exe
Resource
ubuntu2404-amd64-20240523-es
Malware Config
Extracted
njrat
0.7d
HacKed
3skr.uncofig.com:9999
052a8691abcf06ff30b5f4c68922a91f
-
reg_key
052a8691abcf06ff30b5f4c68922a91f
-
splitter
|'|'|
Targets
-
-
Target
lmlmdos.exe
-
Size
23KB
-
MD5
5eb67cac2f9ef8a548ba327896909cda
-
SHA1
b8f3612f2d00c581387b02a615ad178874b51329
-
SHA256
f5c542679e18756fcaaf434a1df9ecee261c8fa6788b75dc64c458e4eef15f2d
-
SHA512
40665518a5451f7bd86ca1e3ad58cec178566c0f45fde647e76c2bb8d81611ca61fe1974cb97988065239005ca63fc9de0c449d45357ee90a8a99ccd30a5415f
-
SSDEEP
384:XweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZQy:oLq411eRpcnuI
-
Njrat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Resource Forking
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5Pre-OS Boot
1Bootkit
1