General
-
Target
Bloxstrap2.5.4.exe
-
Size
7.7MB
-
Sample
240703-w4793atele
-
MD5
393747f1c94ba4d1477ef2384f975c75
-
SHA1
ecb4096d26b9de3643318c449ab57505cd280508
-
SHA256
cd220a2e6e168adf45b8d5978e0e2fffd06b2daaba923251bb0a1f49596bbdb4
-
SHA512
46639921127c58a5a0d8f600363bbf1c4c3756324e75dc5e92a843ff3101c300eb913227be4ed7e8b22461c636328c08f4ea2c2b93bdddb4566c98d616259621
-
SSDEEP
98304:vd5DZNd5DSd5DxTsed5D2ZT00UuOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrTlb:Z+sdtObAbN0Y
Behavioral task
behavioral1
Sample
Bloxstrap2.5.4.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Bloxstrap2.5.4.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
njrat
im523
HacKed
178.78.19.238:1337
f49640ef813b0d20acc558ecf16a0221
-
reg_key
f49640ef813b0d20acc558ecf16a0221
-
splitter
|'|'|
Targets
-
-
Target
Bloxstrap2.5.4.exe
-
Size
7.7MB
-
MD5
393747f1c94ba4d1477ef2384f975c75
-
SHA1
ecb4096d26b9de3643318c449ab57505cd280508
-
SHA256
cd220a2e6e168adf45b8d5978e0e2fffd06b2daaba923251bb0a1f49596bbdb4
-
SHA512
46639921127c58a5a0d8f600363bbf1c4c3756324e75dc5e92a843ff3101c300eb913227be4ed7e8b22461c636328c08f4ea2c2b93bdddb4566c98d616259621
-
SSDEEP
98304:vd5DZNd5DSd5DxTsed5D2ZT00UuOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrTlb:Z+sdtObAbN0Y
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1