General
-
Target
kostyapvealt.exe
-
Size
37KB
-
Sample
241016-vqwtfavfjm
-
MD5
64e78b2e941c1b43d37ef11f3b32e1bb
-
SHA1
33dedf85c8752624c62ca72850bd371ef9c51ae3
-
SHA256
3ecfaa681e3e1273c4ffadc28187573a6f32d7c69694b90fa87c98dc71e5dc39
-
SHA512
a52a0088ff2f1e9f9eba7299e29c7ee4db1288f7bf8d6db78a560de0e199f64708edeee03d5f305bb046c025355da779887a766fba6c85beaa90ee368db1f5bc
-
SSDEEP
384:5QNcoixJ/l7OHg1WykrHD3HC8GYPdArAF+rMRTyN/0L+EcoinblneHQM3epzXHVE:SN+R1NkrHDSNYVArM+rMRa8NulVst
Behavioral task
behavioral1
Sample
kostyapvealt.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kostyapvealt.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HCK
4.tcp.eu.ngrok.io:18495
1126d5bd446b30f6a40a8f76e33de5d2
-
reg_key
1126d5bd446b30f6a40a8f76e33de5d2
-
splitter
|'|'|
Targets
-
-
Target
kostyapvealt.exe
-
Size
37KB
-
MD5
64e78b2e941c1b43d37ef11f3b32e1bb
-
SHA1
33dedf85c8752624c62ca72850bd371ef9c51ae3
-
SHA256
3ecfaa681e3e1273c4ffadc28187573a6f32d7c69694b90fa87c98dc71e5dc39
-
SHA512
a52a0088ff2f1e9f9eba7299e29c7ee4db1288f7bf8d6db78a560de0e199f64708edeee03d5f305bb046c025355da779887a766fba6c85beaa90ee368db1f5bc
-
SSDEEP
384:5QNcoixJ/l7OHg1WykrHD3HC8GYPdArAF+rMRTyN/0L+EcoinblneHQM3epzXHVE:SN+R1NkrHDSNYVArM+rMRa8NulVst
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1