General
-
Target
why.exe
-
Size
55KB
-
Sample
240629-1m1acaxarg
-
MD5
8c9602a318802643b31578dbcfaf7a4a
-
SHA1
44489d5510b1b65bf61bed684eb012950440d775
-
SHA256
582d37ba8e276a3b0c302e3b832c5694f73a4c464198b9880849f53ecba46a1e
-
SHA512
e84c2831fd1ec95f95652c8d17bd7871283f3224a27e54d13327837d5ee7d267363aa6584713c21f7ff89ce96b04d25be676fde7ea9fbcec3dce1e6198a20d65
-
SSDEEP
1536:Z8v4Dnpe/NoTcwiDESPDJwsNMDpXExI3pmom:O4Dn8ymDRPDJwsNMDpXExI3pm
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
h2cKeD
away-displays.gl.at.ply.gg:26916
daacf8c32d27b9947e8a0255b61f395d
-
reg_key
daacf8c32d27b9947e8a0255b61f395d
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
why.exe
-
Size
55KB
-
MD5
8c9602a318802643b31578dbcfaf7a4a
-
SHA1
44489d5510b1b65bf61bed684eb012950440d775
-
SHA256
582d37ba8e276a3b0c302e3b832c5694f73a4c464198b9880849f53ecba46a1e
-
SHA512
e84c2831fd1ec95f95652c8d17bd7871283f3224a27e54d13327837d5ee7d267363aa6584713c21f7ff89ce96b04d25be676fde7ea9fbcec3dce1e6198a20d65
-
SSDEEP
1536:Z8v4Dnpe/NoTcwiDESPDJwsNMDpXExI3pmom:O4Dn8ymDRPDJwsNMDpXExI3pm
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-