General
-
Target
4234d24b653fccceafb526c5a275fd78
-
Size
378KB
-
Sample
240229-vs238sga36
-
MD5
4234d24b653fccceafb526c5a275fd78
-
SHA1
a20603c251fffb1ca5f01b1a7b9fbc58e2a4455c
-
SHA256
c3c035b0d9b92037507ef740ca0beb639da4818a8918089ea2174ed3b87d0bd9
-
SHA512
19816033d37483e9a4984d5f7651340410cda297befcefb0f455b21463d6680d2ae979995ef3b4002c59abbf56695f7dbd1048b8c541bf09574201be71109b01
-
SSDEEP
6144:Kgenlh9zNwdEt742ec+WEO7BClHIZTAE3LbAqhSFwUAuS0qNzgUT:Kgelh9hWu3Xrvk9I6ULsqYAtFz
Static task
static1
Behavioral task
behavioral1
Sample
4234d24b653fccceafb526c5a275fd78.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4234d24b653fccceafb526c5a275fd78.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
njrat
0.7d
HacKed
ocpanel.hackcrack.io:36026
Windows Explorer
-
reg_key
Windows Explorer
-
splitter
|'|'|
Targets
-
-
Target
4234d24b653fccceafb526c5a275fd78
-
Size
378KB
-
MD5
4234d24b653fccceafb526c5a275fd78
-
SHA1
a20603c251fffb1ca5f01b1a7b9fbc58e2a4455c
-
SHA256
c3c035b0d9b92037507ef740ca0beb639da4818a8918089ea2174ed3b87d0bd9
-
SHA512
19816033d37483e9a4984d5f7651340410cda297befcefb0f455b21463d6680d2ae979995ef3b4002c59abbf56695f7dbd1048b8c541bf09574201be71109b01
-
SSDEEP
6144:Kgenlh9zNwdEt742ec+WEO7BClHIZTAE3LbAqhSFwUAuS0qNzgUT:Kgelh9hWu3Xrvk9I6ULsqYAtFz
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1