General
-
Target
RDPWrap-v1.6.2.zip
-
Size
1.5MB
-
Sample
240919-d782nazalr
-
MD5
c26a2c5f6154225e8d83c4000306f162
-
SHA1
67c586cedbf0852aa52268311841cbac5c96fdf8
-
SHA256
35a9481ddbed5177431a9ea4bd09468fe987797d7b1231d64942d17eb54ec269
-
SHA512
d0977bd568d05c20ae3a099a3b9eb44c5ea379060d1470832be933ae98cb517b68509ac0f8679242984e64aef75dc5de5e65f094795fcdc881427ae475fe7c51
-
SSDEEP
49152:cPEbpqUPr0OMPjmNgyV24OXxr2/NV0CA7QUmu4LnB:cPEbpPPrC4gWFOBr4Wfg
Static task
static1
Behavioral task
behavioral1
Sample
RDPCheck.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
RDPConf.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
RDPWInst.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
install.bat
Resource
win10-20240611-en
Behavioral task
behavioral5
Sample
uninstall.bat
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
update.bat
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
RDPCheck.exe
-
Size
1021KB
-
MD5
8f82226b2f24d470c02f6664f67f23f7
-
SHA1
66f40824b406c748846ef11e6b022958f8cbe48b
-
SHA256
5603338a1f8dbb46efb8e0869db3491d5db92f362711d6680f91ecc5d18bfadf
-
SHA512
04bc1f785bddf264699fb6bf6fce9652af8c95872f8fef93540f0b86df2e93ced910f01dc54a76a5425d2f5446d587df6ad20d8976fc4be7e9ce3511eb4b00ee
-
SSDEEP
12288:AR55BK3IsHoeGoE0SYmsjRwH/fD/sK3wzBOSdzIaVI99l/rk9gvQJg7:81KY2oeGTKRqPCBOSd0aVIHloI
Score8/10-
Modifies RDP port number used by Windows
-
-
-
Target
RDPConf.exe
-
Size
1.0MB
-
MD5
03fb8e478f4ba100d37a136231fa2f78
-
SHA1
98685c37a6140701220c476449bee3f4e1fd28ef
-
SHA256
3c0e5d6863b03283afda9bd188501757d47dc57fc4bba2bdbb0d9baa34487fe0
-
SHA512
9d9052691c046e7268543b56c623ea2e9289f226b6c1f6449fbf5e2890f4b66d98e7bc312c663387d9f19d8f1b8b8959f9271fa0e2a51fc15791e29c49d908da
-
SSDEEP
24576:JwewFB5btX9uALSTRMab+wBySRX7ADs9UXOAPOA:At9UMSJADsaXOAPOA
Score8/10-
Modifies RDP port number used by Windows
-
-
-
Target
RDPWInst.exe
-
Size
1.4MB
-
MD5
3288c284561055044c489567fd630ac2
-
SHA1
11ffeabbe42159e1365aa82463d8690c845ce7b7
-
SHA256
ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753
-
SHA512
c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02
-
SSDEEP
24576:prKxoVT2iXc+IZ++6WiaTAsN/3ebTvK+63CWH8iA/iD2hgPjcC8SVdKumYr7:EHZ5pdqYH8ia6GcKuR7
Score3/10 -
-
-
Target
install.bat
-
Size
458B
-
MD5
cbad5b2ca73917006791882274f769e8
-
SHA1
64f0a16503bf751eef0c52ec85e6e2df30306c97
-
SHA256
022364ee1fce61c8a867216c79f223bf47692cd648e3fd6b244fc615b86e4c58
-
SHA512
bebdcc403d0ec41aa53b4b1ac89806d77e1a52bf786eaccdbdf3a43a2ee8c42065c71a7f86f661511a1102105cc5fef9c1d58d711e7adb8c57b9b1d1ff5bc536
-
Modifies Windows Firewall
-
Server Software Component: Terminal Services DLL
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
uninstall.bat
-
Size
249B
-
MD5
eccb8a01d0427ef29c2380d7dda399f3
-
SHA1
302601e99d6b02e2e84a0de5c0dce3df139cba31
-
SHA256
083cd340c800cc021d4a59388680ce0e7ab0f8b998e67def6a507070e7fa01b7
-
SHA512
78d51882fe04cb64f9f6a82b604ef20e4324e5bc37701747fa55b3c153baa5942774daf737ff204f9e75e81a745ed95cc7ec115da91b9e27e646ed41d3f103f9
Score3/10 -
-
-
Target
update.bat
-
Size
249B
-
MD5
29ca1c35075247b035af75c11cab78f1
-
SHA1
4f670d13d7532462f4b1e66d085ef8b9f065ff88
-
SHA256
353f2dc17a4e80564caa175f7170dbedc1b40f704444520ae671f78a5d1f2b6d
-
SHA512
3970adc72020194f93935fad2c17790170da7f0f4444e2bfc402f9924fdceaa4b6443e9871c3b8cda24089b84cbdcf185f0d31238c0be93c58e280cf36ab71a7
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1