General
-
Target
539c30c4e7235d64fd756efb20269392c66c63cb295d8c7a2349befd10974d20N
-
Size
23KB
-
Sample
241004-22e4dswbkf
-
MD5
22f91e626d0fe5a846faa521ee222760
-
SHA1
6e32cc6a1e766666e1d6a0b2ccc934546586afe5
-
SHA256
539c30c4e7235d64fd756efb20269392c66c63cb295d8c7a2349befd10974d20
-
SHA512
89c377af07431696b8903d2ed698c5a6a29ee16f5d2a385659f804fa39c97d6516da96a463dc3ac84eb22a1fcbfebea95d0950b31a4b48bb358b80470be0886a
-
SSDEEP
384:68aZYC9twBNdcvFaly2H0dbJo6HghcASEJqc/ZmRvR6JZlbw8hqIusZzZM+:kY+sNKqNHnSdRpcnu4
Behavioral task
behavioral1
Sample
539c30c4e7235d64fd756efb20269392c66c63cb295d8c7a2349befd10974d20N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
539c30c4e7235d64fd756efb20269392c66c63cb295d8c7a2349befd10974d20N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
MyBot
777ys.cc:3339
88a4b49c2c04ad4a3eef175140304af8
-
reg_key
88a4b49c2c04ad4a3eef175140304af8
-
splitter
|'|'|
Targets
-
-
Target
539c30c4e7235d64fd756efb20269392c66c63cb295d8c7a2349befd10974d20N
-
Size
23KB
-
MD5
22f91e626d0fe5a846faa521ee222760
-
SHA1
6e32cc6a1e766666e1d6a0b2ccc934546586afe5
-
SHA256
539c30c4e7235d64fd756efb20269392c66c63cb295d8c7a2349befd10974d20
-
SHA512
89c377af07431696b8903d2ed698c5a6a29ee16f5d2a385659f804fa39c97d6516da96a463dc3ac84eb22a1fcbfebea95d0950b31a4b48bb358b80470be0886a
-
SSDEEP
384:68aZYC9twBNdcvFaly2H0dbJo6HghcASEJqc/ZmRvR6JZlbw8hqIusZzZM+:kY+sNKqNHnSdRpcnu4
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1