General
-
Target
downloadf-5984vghm1-rar.html
-
Size
17KB
-
Sample
240222-rw92gabe84
-
MD5
d6fa5fb91e78e7e43a66729cf87665ff
-
SHA1
ea3765b6c84bddeb8a006463621e699fd413097f
-
SHA256
81fbdbaf4a7ed22ef0829ee101a808a916e023f74b370a108869770037c61ea3
-
SHA512
4b9d0e95643770f04e51cdeca4af17b5e6bd6870c406772a7e2336634ba1073db0d269f90c6f204f9845272be55d2a9f0d330ff33915ce12577835ad8d10b99a
-
SSDEEP
384:BfRIjUDGO2G9kLL9jl+dVchxMhZCUtiPziMKxv0uldCjw/vZWrFV:BfRIjUDGO2G9kLL9jl+dVc2cLKxXdCgU
Static task
static1
Behavioral task
behavioral1
Sample
downloadf-5984vghm1-rar.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
downloadf-5984vghm1-rar.html
Resource
win10v2004-20240221-en
Malware Config
Extracted
njrat
0.7d
HacKed
mawkly939.hopto.org:1177
df6c55d0ce38f2eb5def2187b310e673
-
reg_key
df6c55d0ce38f2eb5def2187b310e673
-
splitter
|'|'|
Targets
-
-
Target
downloadf-5984vghm1-rar.html
-
Size
17KB
-
MD5
d6fa5fb91e78e7e43a66729cf87665ff
-
SHA1
ea3765b6c84bddeb8a006463621e699fd413097f
-
SHA256
81fbdbaf4a7ed22ef0829ee101a808a916e023f74b370a108869770037c61ea3
-
SHA512
4b9d0e95643770f04e51cdeca4af17b5e6bd6870c406772a7e2336634ba1073db0d269f90c6f204f9845272be55d2a9f0d330ff33915ce12577835ad8d10b99a
-
SSDEEP
384:BfRIjUDGO2G9kLL9jl+dVchxMhZCUtiPziMKxv0uldCjw/vZWrFV:BfRIjUDGO2G9kLL9jl+dVc2cLKxXdCgU
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1