Resubmissions
23-09-2023 06:20
230923-g3294afc74 622-09-2023 09:24
230922-ldawrshb83 1021-09-2023 15:40
230921-s4gwbsha8z 419-09-2023 16:03
230919-thpvgscc79 119-09-2023 13:37
230919-qw5w3shc6s 1019-09-2023 13:25
230919-qn8yrsbc63 1013-09-2023 11:47
230913-nx8m9aeb62 412-09-2023 19:11
230912-xv98qshf86 1012-09-2023 19:03
230912-xqr7cshf46 1012-09-2023 11:47
230912-nybd5sca41 1General
-
Target
https://google.com
-
Sample
230912-xv98qshf86
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com
Resource
win10-20230703-en
Malware Config
Extracted
njrat
im523
HacKed
5.tcp.eu.ngrok.io:19587
d8c514f6c639c3b8951aabb752c3344a
-
reg_key
d8c514f6c639c3b8951aabb752c3344a
-
splitter
|'|'|
Targets
-
-
Target
https://google.com
Score10/10-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1