General
-
Target
Clientpub.exe
-
Size
31KB
-
Sample
240103-19cgsseab4
-
MD5
df9a4cfc2e63623606c2bc5ad36e331f
-
SHA1
38337a7e0e99f555c95032da52e3fed8174d9c41
-
SHA256
485de354398cf7128900271acd438a9ef024ae30a6680a677c49e3615a92cee2
-
SHA512
88e38ebf30a0cecfa3288d5dc7582417981f733f3a017e96a220482354eacbe10e1adac90e5caa64c5b7957f7861b9ce5d3ab29ab5d22402baad7596bf4e6775
-
SSDEEP
768:kW1Z6U513vqzxl+r9UD3Z4gLv8wuQmIDUu0ticRj:OIqR48BuQVkVj
Behavioral task
behavioral1
Sample
Clientpub.exe
Resource
win10-20231215-en
Malware Config
Extracted
njrat
0.7d
MyBot
147.185.221.17:56266
5c6d74c1d6da9f38491c5a3177b71988
-
reg_key
5c6d74c1d6da9f38491c5a3177b71988
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
Clientpub.exe
-
Size
31KB
-
MD5
df9a4cfc2e63623606c2bc5ad36e331f
-
SHA1
38337a7e0e99f555c95032da52e3fed8174d9c41
-
SHA256
485de354398cf7128900271acd438a9ef024ae30a6680a677c49e3615a92cee2
-
SHA512
88e38ebf30a0cecfa3288d5dc7582417981f733f3a017e96a220482354eacbe10e1adac90e5caa64c5b7957f7861b9ce5d3ab29ab5d22402baad7596bf4e6775
-
SSDEEP
768:kW1Z6U513vqzxl+r9UD3Z4gLv8wuQmIDUu0ticRj:OIqR48BuQVkVj
Score10/10-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1