General
-
Target
cheat(crack).zip
-
Size
22.4MB
-
Sample
241008-weew8a1gqg
-
MD5
a9bbe94ce07b91f949631cee1447f84d
-
SHA1
7dd9a0d08ff9a090ff8e0d498fa21c1bc5986d3c
-
SHA256
0d0b902df62c00b15d1e6043a98262905b556aec52c628179c9e39e8f315ee7e
-
SHA512
bbd60c09984f1aebc30ff93c47642d254b3954a6bdd32ba5f9ab3f32a2eeb296339a51dd12822eb80e5cd43d513f3afcc437c865a8482245c0a23c6a0fdb2c7b
-
SSDEEP
393216:yxJqmbOB2P/+x4jlzKmoCmwEncKSz6T39Bbab48WfS2kiK1+ZWs/vx0K9N:yPqci2P/+fmoDncKLBbm48WfSZ1+ZN/z
Static task
static1
Behavioral task
behavioral1
Sample
cheat(crack).zip
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
cheat(crack).zip
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
cheat(crack)/Cheat(crack).exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
cheat(crack)/Cheat(crack).exe
Resource
win11-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
inn-communications.gl.at.ply.gg:59113
8f5d693a6c9562fb214f7b3d3aabc00c
-
reg_key
8f5d693a6c9562fb214f7b3d3aabc00c
-
splitter
|'|'|
Targets
-
-
Target
cheat(crack).zip
-
Size
22.4MB
-
MD5
a9bbe94ce07b91f949631cee1447f84d
-
SHA1
7dd9a0d08ff9a090ff8e0d498fa21c1bc5986d3c
-
SHA256
0d0b902df62c00b15d1e6043a98262905b556aec52c628179c9e39e8f315ee7e
-
SHA512
bbd60c09984f1aebc30ff93c47642d254b3954a6bdd32ba5f9ab3f32a2eeb296339a51dd12822eb80e5cd43d513f3afcc437c865a8482245c0a23c6a0fdb2c7b
-
SSDEEP
393216:yxJqmbOB2P/+x4jlzKmoCmwEncKSz6T39Bbab48WfS2kiK1+ZWs/vx0K9N:yPqci2P/+fmoDncKLBbm48WfSZ1+ZN/z
Score1/10 -
-
-
Target
cheat(crack)/Cheat(crack).exe
-
Size
19.1MB
-
MD5
f9da6a2308ad8b33759396eba9d71a55
-
SHA1
d2897b32f46c232f14958a2458331274360f297d
-
SHA256
25f7453e76cd457a4646bbba21a1c2dedb0e0cd8f90e7d249e93dfd6c2b77de3
-
SHA512
c04e5804fdaf7642cade1c8d943260e2315f358cfb749dca9311798bc43d3b393b8012e3f33fea9d33745ef53c212a0592102e1b3b9d979610f3a940eb1b0bd2
-
SSDEEP
393216:CDTF+si4rs4FMRk/aD+CeXhX7NqtSmqu/2o4Pe5MCEJXZrHyxMz6:YT7zhMRk/NhhsFqu/d4PJBXmMz6
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1