General
-
Target
8363cb13ab33693e3becb25d2ba06908b5071921e4d2bfbec410c38f593267b3
-
Size
16KB
-
Sample
240419-vas3lshf46
-
MD5
e2e524c7032f95f70c527e4ab4754272
-
SHA1
17bac8b4840cda0e835a12f2b3164858bec98942
-
SHA256
8363cb13ab33693e3becb25d2ba06908b5071921e4d2bfbec410c38f593267b3
-
SHA512
acc92d7b5170569a0d6111a49813b8ce2f8f09592002f39959665602e444b1cd3ad43956a49f88c22c869197891487d8243fb926ad08faef2c7ce3adde11bcc6
-
SSDEEP
384:BUdzhpd8WjQy2pShP7B+JEtPxMRC0qauC/+X5f:ipd8WjQy2pSJDx6RQ3CWXt
Behavioral task
behavioral1
Sample
d812b05b85a25ab0ec4258f8a4e9adda4a84d2df5b07fed42b84de539dfcabc8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d812b05b85a25ab0ec4258f8a4e9adda4a84d2df5b07fed42b84de539dfcabc8.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
njrat
im523
HacKed
2.tcp.eu.ngrok.io:18227
fa8cebf4f3fd11252bf351a94ee5fa4a
-
reg_key
fa8cebf4f3fd11252bf351a94ee5fa4a
-
splitter
|'|'|
Targets
-
-
Target
d812b05b85a25ab0ec4258f8a4e9adda4a84d2df5b07fed42b84de539dfcabc8.exe
-
Size
37KB
-
MD5
0a7d2bbbe2960ff24b9273036fc472da
-
SHA1
3b0fbb910651427a6a103327a0630e96acb8649c
-
SHA256
d812b05b85a25ab0ec4258f8a4e9adda4a84d2df5b07fed42b84de539dfcabc8
-
SHA512
8266b81b3d24b0650465d35a5cf83ea4339f7cf417a78e4a5bd8eb5d111bd90eeb1c672dbe7a2c6f772849aecf13c6fe62488958cd27986727cd723d154dd62f
-
SSDEEP
384:jstKUiDtblmJEpRGyEf7JfJuQCY6iXQrAF+rMRTyN/0L+EcoinblneHQM3epzX48:YtiHpR9Ef7JsQCFiArM+rMRa8NuqUt
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1