General
-
Target
847f9f041806776e957a60cda7cb58b332583e151eda78e431f4abd82bf7a488_JC.exe
-
Size
37KB
-
Sample
230815-s7bhqabe83
-
MD5
858dbea161dd4074ec9a9fefc2aed7d4
-
SHA1
6f39ba23961d661200c94c3e65bc8b856c2980ab
-
SHA256
847f9f041806776e957a60cda7cb58b332583e151eda78e431f4abd82bf7a488
-
SHA512
cc7f7fc544896e8b66cb3b5ae728dc6a9815d05634777e28a1ea9838bee24d23028d907ae4102fabf6a50826a74dba3fe99f41693650cd3a400913e15949c76f
-
SSDEEP
384:PlQZCiT9SLHHGhlbJcycPXvQJKUPDYwSo55rAF+rMRTyN/0L+EcoinblneHQM3e5:NIJrJ/cPXoKUU1oTrM+rMRa8NuxD8tQ
Behavioral task
behavioral1
Sample
847f9f041806776e957a60cda7cb58b332583e151eda78e431f4abd82bf7a488_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
847f9f041806776e957a60cda7cb58b332583e151eda78e431f4abd82bf7a488_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
njrat
im523
11221
147.50.253.218:1234
519b55464950ce55b68715cb59bcfbfb
-
reg_key
519b55464950ce55b68715cb59bcfbfb
-
splitter
|'|'|
Targets
-
-
Target
847f9f041806776e957a60cda7cb58b332583e151eda78e431f4abd82bf7a488_JC.exe
-
Size
37KB
-
MD5
858dbea161dd4074ec9a9fefc2aed7d4
-
SHA1
6f39ba23961d661200c94c3e65bc8b856c2980ab
-
SHA256
847f9f041806776e957a60cda7cb58b332583e151eda78e431f4abd82bf7a488
-
SHA512
cc7f7fc544896e8b66cb3b5ae728dc6a9815d05634777e28a1ea9838bee24d23028d907ae4102fabf6a50826a74dba3fe99f41693650cd3a400913e15949c76f
-
SSDEEP
384:PlQZCiT9SLHHGhlbJcycPXvQJKUPDYwSo55rAF+rMRTyN/0L+EcoinblneHQM3e5:NIJrJ/cPXoKUU1oTrM+rMRa8NuxD8tQ
Score10/10-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1