General
-
Target
x4.exe.bin.zip
-
Size
24KB
-
Sample
240912-s27c7ssalg
-
MD5
c679ed4fc3d1cd4a85498d34aaf836bc
-
SHA1
8d08c410bc26191dabc7030d335423c351131972
-
SHA256
ae89a0e3b406cd473712df9c32363a0871611d09b411120f07d0836e3c64e5b1
-
SHA512
897860ef71d09e9d96c99a9b020bee9310a5ee96a15f164022a2b3d7e7cd1fb3b3ef9a12ecd44c78d099dcfc7513ccd90be53bb64cab2819fad74b88abe6f689
-
SSDEEP
384:Mccnx1M38fvgDWlc+8ytOs4YTNF0wWPhWK0MGyws6zDX6LiQnVLhsikV2q1DegB9:QM3Gg6EyB9FooSbkynsikVJAgBSER
Behavioral task
behavioral1
Sample
x4.exe
Resource
win11-20240802-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
limited-architect.gl.at.ply.gg:52522
e61d751939442896523a0628facf1d34
-
reg_key
e61d751939442896523a0628facf1d34
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
x4.exe.bin
-
Size
54KB
-
MD5
f01403f4fc9c0727876a46568faee2a5
-
SHA1
1323d3cd7517b50a52f774024af682decf3c3698
-
SHA256
48f2fc5866fcc8d9c02674e7fcb6e46f82aa94ccef260a885205c537c3a3ca44
-
SHA512
99c6fdd4aeadb54e699a2ef628b2c1e44c9bd02c031399dd9d62e1c256e974829668b0cef33c84493dc6fa83bd0ab70eabf975b89b58cdce6aa21650e2d56cef
-
SSDEEP
768:gVXZuIZ2Eslt0g5X3SY3qZJSNDxWQG35bmaePD5Pvp2XXJdxIEpmag:gVB1Gt0g5SYSG9WQcGDYX3xIEpmag
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1