General
-
Target
d23bff11e9aa5f743e7a0063b86b2b9a59a6dc56760eb37498a2df3386150603N
-
Size
23KB
-
Sample
241020-zbhqgszhkl
-
MD5
17b70e5760d1cd01cdf136d0e4ef41d0
-
SHA1
c000eae79731c8c0a44332a15c0e019b6a98c0c1
-
SHA256
d23bff11e9aa5f743e7a0063b86b2b9a59a6dc56760eb37498a2df3386150603
-
SHA512
fcf229adc35f1cabba02d961b280391e1a5e1e05fcc2f422b76a40642e0a6b142b47a116bc524ade30391042a232bf02fec90c7ce6fa938ab8f30fd8281305cd
-
SSDEEP
384:MMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZL6:fb9glF51LRpcnuF
Behavioral task
behavioral1
Sample
d23bff11e9aa5f743e7a0063b86b2b9a59a6dc56760eb37498a2df3386150603N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d23bff11e9aa5f743e7a0063b86b2b9a59a6dc56760eb37498a2df3386150603N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
Lammer
csgocheats.ddns.net:1177
ef4b9e3dcbc63f1d8507fa3bc932f5d9
-
reg_key
ef4b9e3dcbc63f1d8507fa3bc932f5d9
-
splitter
|'|'|
Targets
-
-
Target
d23bff11e9aa5f743e7a0063b86b2b9a59a6dc56760eb37498a2df3386150603N
-
Size
23KB
-
MD5
17b70e5760d1cd01cdf136d0e4ef41d0
-
SHA1
c000eae79731c8c0a44332a15c0e019b6a98c0c1
-
SHA256
d23bff11e9aa5f743e7a0063b86b2b9a59a6dc56760eb37498a2df3386150603
-
SHA512
fcf229adc35f1cabba02d961b280391e1a5e1e05fcc2f422b76a40642e0a6b142b47a116bc524ade30391042a232bf02fec90c7ce6fa938ab8f30fd8281305cd
-
SSDEEP
384:MMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZL6:fb9glF51LRpcnuF
-
Modifies Windows Firewall
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1