General
-
Target
Johnnyspanel.exe
-
Size
63KB
-
Sample
241012-eccwea1gqd
-
MD5
e6b3b8ea39d8bc6eea1c703295d17ef2
-
SHA1
34babad08af3f8ae9f4e6507625167038d479dd7
-
SHA256
c40a6434008cf6fb6738f64bc52b5aa0f93cf50dec65c3d84e34174cfd3e962d
-
SHA512
24a5505feddfe229304fd4c15af49e81e02cddbc0bc1612daa9a670fa13faab90a729079cdf1fbec176cda88c8ffcb6822d1f6aafeb5be774b15d7e45d829563
-
SSDEEP
768:S+BAGkPhz/n78FoC8A+Xk+YDT8JHy31+T4ySBGHmDbDgps0oXnoIIjzsSukdpqKX:Tq/bL2h39YUbWs9oVzrukdpqKmY7
Behavioral task
behavioral1
Sample
Johnnyspanel.exe
Resource
win10-20240404-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:3232
-
delay
1
-
install
true
-
install_file
Run.exe
-
install_folder
%AppData%
Targets
-
-
Target
Johnnyspanel.exe
-
Size
63KB
-
MD5
e6b3b8ea39d8bc6eea1c703295d17ef2
-
SHA1
34babad08af3f8ae9f4e6507625167038d479dd7
-
SHA256
c40a6434008cf6fb6738f64bc52b5aa0f93cf50dec65c3d84e34174cfd3e962d
-
SHA512
24a5505feddfe229304fd4c15af49e81e02cddbc0bc1612daa9a670fa13faab90a729079cdf1fbec176cda88c8ffcb6822d1f6aafeb5be774b15d7e45d829563
-
SSDEEP
768:S+BAGkPhz/n78FoC8A+Xk+YDT8JHy31+T4ySBGHmDbDgps0oXnoIIjzsSukdpqKX:Tq/bL2h39YUbWs9oVzrukdpqKmY7
-
Async RAT payload
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Modifies system executable filetype association
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1