General
-
Target
354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991N
-
Size
37KB
-
Sample
240920-j43ncsxckk
-
MD5
8a59c16c10ffa6c22770bdf07d3fb4c0
-
SHA1
c21e6bedd447ac4855006f35df5aef68ffa75b38
-
SHA256
354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991
-
SHA512
9cdd20635826225b7bda3fae88d822d7eb9cf442caa6c8a3c164865208aca1cb73c17acb0c1a74f43f049d92c3c956b11013e8b27c4f724bcc750a6ec1dd6c15
-
SSDEEP
384:/gtvEiTbTvpWNcZ0y8fvCv3v3cLkacpjrAF+rMRTyN/0L+EcoinblneHQM3epzXF:Yt7TZ38fvCv3E1c1rM+rMRa8NunRt
Behavioral task
behavioral1
Sample
354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
HacKed
4.tcp.eu.ngrok.io:11961
03b4c5d6915391a54e8f12c89b78174f
-
reg_key
03b4c5d6915391a54e8f12c89b78174f
-
splitter
|'|'|
Targets
-
-
Target
354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991N
-
Size
37KB
-
MD5
8a59c16c10ffa6c22770bdf07d3fb4c0
-
SHA1
c21e6bedd447ac4855006f35df5aef68ffa75b38
-
SHA256
354d38e6f67fb9891b5c4d0940b16d7052f80bbb1faa01c3baa70634c2f50991
-
SHA512
9cdd20635826225b7bda3fae88d822d7eb9cf442caa6c8a3c164865208aca1cb73c17acb0c1a74f43f049d92c3c956b11013e8b27c4f724bcc750a6ec1dd6c15
-
SSDEEP
384:/gtvEiTbTvpWNcZ0y8fvCv3v3cLkacpjrAF+rMRTyN/0L+EcoinblneHQM3epzXF:Yt7TZ38fvCv3E1c1rM+rMRa8NunRt
-
Modifies Windows Firewall
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1