General
-
Target
FOXAUTO V8.zip
-
Size
16.7MB
-
Sample
240830-e8jntswgpg
-
MD5
2dbe69c2a2a25b80a86e048ad1d872d2
-
SHA1
ddfa838f0d32c4904ece33ec278c4ac4f9fe64c8
-
SHA256
6e9cab5ac9495c9799c87056bdf570dc36a2e03eab08703ed659cc7b8b35ac12
-
SHA512
38e5b6f01a120b2888a169cce426a9f0ac4c37b2c6ce8d7572181cef11366a53cf7e62536284f3df078fb254274bad20a9ec5e55d21e5b57dd97366d2bc0e26f
-
SSDEEP
393216:8yCHJnn9Sk8zsOOH+qg9BvyYuSnohM1QQt:8XH19Sk8zsb+qypypYlTt
Behavioral task
behavioral1
Sample
FOXAUTO V8/FoxAutoV8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
FOXAUTO V8/FoxAutoV8.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
HacKed
acpanel.hackcrack.io:16164
Windows Explorer
-
reg_key
Windows Explorer
-
splitter
|'|'|
Targets
-
-
Target
FOXAUTO V8/FoxAutoV8.exe
-
Size
17.1MB
-
MD5
1d54a576355df6926a7a2ef43a91b316
-
SHA1
26d9f73ceebb6e790d767d51921962e4eac9f8c8
-
SHA256
96d5de118289d25d3b8fbacf542ec7357d3a6aae61f8c953a07347654bc4ebc2
-
SHA512
67da0b995839413eef70247202c727e29c8635da21e234dbaf50ebc2311cabd86ff8931471811dc49b4e4eeafba79f1662cdc4281da51405ef97debf7e4bdf23
-
SSDEEP
393216:m3szf490qL2Vmd6m5FTodIn+LH/+zVbJR6f5zCbrZDBXRFq9Lgi0Gyu:m3szfm0qyVmdjTbJR6f5CHZDBXPq9Lg2
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1