General
-
Target
d6f492c77854936f08353fd01db226273a6312077e90d2eddd8acfc6e49604fe
-
Size
17KB
-
Sample
240419-vaxe2ahf53
-
MD5
2acb078dcd52bbc64949c61d66cc6e58
-
SHA1
66d9c9c03a7dcfc3e453251c438b4945b000ac53
-
SHA256
d6f492c77854936f08353fd01db226273a6312077e90d2eddd8acfc6e49604fe
-
SHA512
c30433892a949efe9a73c9b9122b28dffa22f3995b788dfa864d3a3e84cf63b8141b986e5e2555a836345a7101af2852402982773051aef3a26db79f8411c22f
-
SSDEEP
384:FdiE2upgTmW+S9iFif2gkoN3f4tq+6ceP83mkmfc+X0ukQz5idjeQ:LRIi4bFkO3fOqie03mkoco0gz5idjeQ
Behavioral task
behavioral1
Sample
846e326bf44156b57b223a47574ce383a12a36600d58abc92ad4bffed46647ff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
846e326bf44156b57b223a47574ce383a12a36600d58abc92ad4bffed46647ff.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
njrat
im523
HacKed
0.tcp.eu.ngrok.io:25505
afe56b93a28a14c8bcebd0992e16ca71
-
reg_key
afe56b93a28a14c8bcebd0992e16ca71
-
splitter
|'|'|
Targets
-
-
Target
846e326bf44156b57b223a47574ce383a12a36600d58abc92ad4bffed46647ff.exe
-
Size
37KB
-
MD5
d0c3e7b04033acd95ef28afbb67f88fe
-
SHA1
c5c9d57e77969aca2e42d7b644f776be17be27fd
-
SHA256
846e326bf44156b57b223a47574ce383a12a36600d58abc92ad4bffed46647ff
-
SHA512
1dcd953cfba7c54bd0a3bd5c58407d1c98c1cd82c43de3039f52d4d36a1310b4705b53fbdb04ae46e7bea9ad2fbe6a36f172018a79b274210377895711a9881a
-
SSDEEP
384:g0SvEiTbTvpWNcZ0y8fvCv3v3cLkacJEJrAF+rMRTyN/0L+EcoinblneHQM3epz0:jS7TZ38fvCv3E1cUrM+rMRa8Nuq1t
Score8/10-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1