General
-
Target
ce408e126def4dab38a7a260d4775111b140154cfc5abb1b6a0f397884e0577aexe.exe
-
Size
37KB
-
Sample
231207-x23ggaef44
-
MD5
47e3f3358fbf1ee79fbed6e4f22d28e8
-
SHA1
1ff51a2a2c9ef6b5c21824f77fd44b262e7e42e1
-
SHA256
ce408e126def4dab38a7a260d4775111b140154cfc5abb1b6a0f397884e0577a
-
SHA512
0b35e8198bc70d9ead4a96fcf9d14a67562216c38855ac7f4f6d23577da874ddf543eccd5ae28180c02063f370c62cf1ad3a4b1a8af89ec720cea68a368aaf48
-
SSDEEP
384:3QKvEiTbHvpWNcZ0y8f7CTvvrILkCwE3rAF+rMRTyN/0L+EcoinblneHQM3epzXJ:gKXTZ38f7CTv8FwKrM+rMRa8NuzFt
Behavioral task
behavioral1
Sample
ce408e126def4dab38a7a260d4775111b140154cfc5abb1b6a0f397884e0577aexe.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
ce408e126def4dab38a7a260d4775111b140154cfc5abb1b6a0f397884e0577aexe.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
njrat
im523
HacKed
0.tcp.eu.ngrok.io:16921
8be032421617ac901feeb88dde9830e6
-
reg_key
8be032421617ac901feeb88dde9830e6
-
splitter
|'|'|
Targets
-
-
Target
ce408e126def4dab38a7a260d4775111b140154cfc5abb1b6a0f397884e0577aexe.exe
-
Size
37KB
-
MD5
47e3f3358fbf1ee79fbed6e4f22d28e8
-
SHA1
1ff51a2a2c9ef6b5c21824f77fd44b262e7e42e1
-
SHA256
ce408e126def4dab38a7a260d4775111b140154cfc5abb1b6a0f397884e0577a
-
SHA512
0b35e8198bc70d9ead4a96fcf9d14a67562216c38855ac7f4f6d23577da874ddf543eccd5ae28180c02063f370c62cf1ad3a4b1a8af89ec720cea68a368aaf48
-
SSDEEP
384:3QKvEiTbHvpWNcZ0y8f7CTvvrILkCwE3rAF+rMRTyN/0L+EcoinblneHQM3epzXJ:gKXTZ38f7CTv8FwKrM+rMRa8NuzFt
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1