General
-
Target
ac30a06bb9c7b5cc0e18b9bfc9e54bd9.exe
-
Size
37KB
-
Sample
240221-qlm9aagd38
-
MD5
ac30a06bb9c7b5cc0e18b9bfc9e54bd9
-
SHA1
7232e66f7417fcb96ca2b6dc5207b0b823be1462
-
SHA256
cef570542198bfab9319da2c3068da34484f72d77e5437f3f0592d26b26aaf69
-
SHA512
e3a467e22e088cc60507ce48be58a439a8b06bd2e2fa1c407acd2cf821757f54070cce6902e5a13b5de23cd1b963cb5e1d7ba23564b641793f2fe834dfc2398d
-
SSDEEP
384:id7pTgiG1C/ZfursvO6yszSLoPZYTn+LKrAF+rMRTyN/0L+EcoinblneHQM3epzg:opP5WpszSLoWT+WrM+rMRa8Nu6ht
Behavioral task
behavioral1
Sample
ac30a06bb9c7b5cc0e18b9bfc9e54bd9.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ac30a06bb9c7b5cc0e18b9bfc9e54bd9.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
njrat
im523
Лошок
5.tcp.eu.ngrok.io:13326
1c7d94c93e29463dd3914e19ee6714b6
-
reg_key
1c7d94c93e29463dd3914e19ee6714b6
-
splitter
|'|'|
Targets
-
-
Target
ac30a06bb9c7b5cc0e18b9bfc9e54bd9.exe
-
Size
37KB
-
MD5
ac30a06bb9c7b5cc0e18b9bfc9e54bd9
-
SHA1
7232e66f7417fcb96ca2b6dc5207b0b823be1462
-
SHA256
cef570542198bfab9319da2c3068da34484f72d77e5437f3f0592d26b26aaf69
-
SHA512
e3a467e22e088cc60507ce48be58a439a8b06bd2e2fa1c407acd2cf821757f54070cce6902e5a13b5de23cd1b963cb5e1d7ba23564b641793f2fe834dfc2398d
-
SSDEEP
384:id7pTgiG1C/ZfursvO6yszSLoPZYTn+LKrAF+rMRTyN/0L+EcoinblneHQM3epzg:opP5WpszSLoWT+WrM+rMRa8Nu6ht
Score8/10-
Modifies Windows Firewall
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1