General
-
Target
ks4.021.3.10.391en_25092.exe
-
Size
2.6MB
-
Sample
230322-sy37dahf44
-
MD5
c981d0b88d6105d07a0b7e8c18c26816
-
SHA1
44675421dcd4f1c84d59482878fed08ab35cb637
-
SHA256
1ef55e3f98c99fd6583a6b4080ecf0bc71de7c2889c910ec73c9df9f3e282b32
-
SHA512
870ae87c2ebc825ad7ea28d8c279f706e614cbdfde4b5b9b63d742a5377474109e89910feda8140027fa2c81b666d47cee8e3e9d7944992eeaffe465cfca1f47
-
SSDEEP
49152:V47Nlau3ZrJvDrO61pLTv1qfeosvBF2D7AZyzpLcsHOR+9rp+Hgd0OAoq89E783y:VeNlau39JO61x8f2SnC89l+i0OPrp
Static task
static1
Behavioral task
behavioral1
Sample
ks4.021.3.10.391en_25092.exe
Resource
win10-20230220-en
Malware Config
Extracted
njrat
0.7.3
resilencoa 2023
verderesilencia.duckdns.org:2010
te culio
-
reg_key
te culio
-
splitter
2023
Targets
-
-
Target
ks4.021.3.10.391en_25092.exe
-
Size
2.6MB
-
MD5
c981d0b88d6105d07a0b7e8c18c26816
-
SHA1
44675421dcd4f1c84d59482878fed08ab35cb637
-
SHA256
1ef55e3f98c99fd6583a6b4080ecf0bc71de7c2889c910ec73c9df9f3e282b32
-
SHA512
870ae87c2ebc825ad7ea28d8c279f706e614cbdfde4b5b9b63d742a5377474109e89910feda8140027fa2c81b666d47cee8e3e9d7944992eeaffe465cfca1f47
-
SSDEEP
49152:V47Nlau3ZrJvDrO61pLTv1qfeosvBF2D7AZyzpLcsHOR+9rp+Hgd0OAoq89E783y:VeNlau39JO61x8f2SnC89l+i0OPrp
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-