General
-
Target
7xGv1.rar
-
Size
16KB
-
Sample
250329-tw61xsxsdx
-
MD5
b13ec2e4d3252121723ce40a3961b744
-
SHA1
73933ad5704532b05374a99c433c1410bf2f4072
-
SHA256
9347f295b4b16f9a6dd0513b43a58549a307547b2001781d5f1a27b4e4f34443
-
SHA512
4cf67d3123bbaf698807fecd0ef22f52eb1b1b425ed9114320cb52814278a8365426eee76fda3b873fbbd8bc6bd1b8076d454f64664d0b2ea422fa98079d8291
-
SSDEEP
384:ijIVgGZwjruZ4Gdc3A2YOQ5Qkb2UYo7u4UZiR:i3o2KwLTAR2l4jR
Behavioral task
behavioral1
Sample
7xG.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
im523
HackedSorry
127.0.0.1:5552
72b9677783005d3ff7767152e2734d7e
-
reg_key
72b9677783005d3ff7767152e2734d7e
-
splitter
|'|'|
Targets
-
-
Target
7xG.exe
-
Size
37KB
-
MD5
a1ebbd72b02bbdbe1dd3b84fcdd32d36
-
SHA1
57459e3813b77028b71cf1573a13ea045598a018
-
SHA256
d6341ff7300b399cf031e26c87c0a5392f136ead1676e005c655eddcfd51a763
-
SHA512
26cdb08be64ebefade04d048805e4a8b4b430dde0c74bb042cc438bba82c94fde3c8b8fe020d964ac7d78a48b2667fc3bade4a2235730d232fefc6b2795288d8
-
SSDEEP
384:xMc1ZCiMd3jBVbJsy8PnabAoJ3xv1QqKVFrAF+rMRTyN/0L+EcoinblneHQM3epY:i3bJP8PnCAG/dKvrM+rMRa8Nusyqt
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1