Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 19:18

General

  • Target

    кряк никсвар/nixwarecrack_26082024.exe

  • Size

    43KB

  • MD5

    afbfd995fcaa54e1595b086548fe09d3

  • SHA1

    c94e3685fcc937da2e0ea49b99bec942f96e0346

  • SHA256

    bd3c008458988fb2ef7f3f8d99bd306bfc1ebe2751e1e5a33f59fc7878707c9f

  • SHA512

    3007b31abf20e99b90e0c96007a2ba1e33b499e7cd263ec464816f040a671264d24768df090ecd8f550cfc84a61a794a795220337c299033ece5a1b267b72707

  • SSDEEP

    768:pvA2QOuJcRvIl7abYg/sVUMTcSFCRK7j9U6xmZxiX8kkl9U2kSfaK0JZ:OhBCIl7abBs2M4OCRK7jCAilu2kmiZ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

test

C2

127.0.0.1:8085

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    |Ghost|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\кряк никсвар\nixwarecrack_26082024.exe
    "C:\Users\Admin\AppData\Local\Temp\кряк никсвар\nixwarecrack_26082024.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4880-0-0x00007FFD5E545000-0x00007FFD5E546000-memory.dmp

    Filesize

    4KB

  • memory/4880-1-0x000000001B630000-0x000000001BAFE000-memory.dmp

    Filesize

    4.8MB

  • memory/4880-2-0x00007FFD5E290000-0x00007FFD5EC31000-memory.dmp

    Filesize

    9.6MB

  • memory/4880-3-0x00007FFD5E290000-0x00007FFD5EC31000-memory.dmp

    Filesize

    9.6MB

  • memory/4880-4-0x000000001C070000-0x000000001C086000-memory.dmp

    Filesize

    88KB

  • memory/4880-5-0x000000001C310000-0x000000001C3B6000-memory.dmp

    Filesize

    664KB

  • memory/4880-6-0x000000001C520000-0x000000001C5BC000-memory.dmp

    Filesize

    624KB

  • memory/4880-7-0x0000000000D80000-0x0000000000D88000-memory.dmp

    Filesize

    32KB

  • memory/4880-8-0x00007FFD5E545000-0x00007FFD5E546000-memory.dmp

    Filesize

    4KB

  • memory/4880-9-0x00007FFD5E290000-0x00007FFD5EC31000-memory.dmp

    Filesize

    9.6MB

  • memory/4880-10-0x00007FFD5E290000-0x00007FFD5EC31000-memory.dmp

    Filesize

    9.6MB