General

  • Target

    NiceRAT.exe

  • Size

    20.2MB

  • Sample

    240527-vtjchsbc8x

  • MD5

    16dc47f5cb6f77b9155a550db8b889a0

  • SHA1

    013c28f62e3b7308ceb34ae54a7976d13d5299d6

  • SHA256

    10290da3fb5778c74ce27a0ad1d1ea223c35095845162e39eee255bf910b4e2a

  • SHA512

    6d1ef7b3fc9339a56daad0c10ff4a808f92c7d2d07782160541b5f7415f098c14feb26817717daa4ef5197f7dad8751569001c2b2ac9878c03d442616b42ee76

  • SSDEEP

    393216:XEkZQtss27GjJWQsUcR4NzQW+eGQRg93iObIhRS/MLGrqT6oHd85Tv/:XhQtsAjYQFIW+e5R49MhR9qePy5T

Malware Config

Targets

    • Target

      NiceRAT.exe

    • Size

      20.2MB

    • MD5

      16dc47f5cb6f77b9155a550db8b889a0

    • SHA1

      013c28f62e3b7308ceb34ae54a7976d13d5299d6

    • SHA256

      10290da3fb5778c74ce27a0ad1d1ea223c35095845162e39eee255bf910b4e2a

    • SHA512

      6d1ef7b3fc9339a56daad0c10ff4a808f92c7d2d07782160541b5f7415f098c14feb26817717daa4ef5197f7dad8751569001c2b2ac9878c03d442616b42ee76

    • SSDEEP

      393216:XEkZQtss27GjJWQsUcR4NzQW+eGQRg93iObIhRS/MLGrqT6oHd85Tv/:XhQtsAjYQFIW+e5R49MhR9qePy5T

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks