General
-
Target
PROTECTOR FREEE V2.0.exe
-
Size
935KB
-
Sample
241022-ymkhsa1dnc
-
MD5
67aeb6a710e8a683cf7e6d71e2a9fb08
-
SHA1
d48b94c93c08d83271775f436ae1007a3f98cfd0
-
SHA256
cf9d4ea03b78e714309ae2f55d416bb7bdacccac19cef39b9fc1fb7b4218dae8
-
SHA512
26c6c4d26b0b10c35605b93fb31d635c1bc51034c93ab99b8e9f33dc3fea038060ed083e71eda7a476798b5649f35cfa2d57e1a60c959ec18c43a315efc4910f
-
SSDEEP
24576:pdGDyyUEuzp/rnemeg9Hm8b0tHZWTkQ4:5nMQMK0XD/
Static task
static1
Behavioral task
behavioral1
Sample
PROTECTOR FREEE V2.0.exe
Resource
win10-20240404-en
Malware Config
Extracted
njrat
0.7d
تم الاختراق بواسطه احمد السيسي
hakim32.ddns.net:2000
yyorqqp.ddns.net:4444
dc8e2dde5f4470426aa15187e5670a34
-
reg_key
dc8e2dde5f4470426aa15187e5670a34
-
splitter
|'|'|
Extracted
xworm
5.0
yyorqqp.ddns.net:8888
dXDhpVyLJZXEOquV
-
install_file
USB.exe
Targets
-
-
Target
PROTECTOR FREEE V2.0.exe
-
Size
935KB
-
MD5
67aeb6a710e8a683cf7e6d71e2a9fb08
-
SHA1
d48b94c93c08d83271775f436ae1007a3f98cfd0
-
SHA256
cf9d4ea03b78e714309ae2f55d416bb7bdacccac19cef39b9fc1fb7b4218dae8
-
SHA512
26c6c4d26b0b10c35605b93fb31d635c1bc51034c93ab99b8e9f33dc3fea038060ed083e71eda7a476798b5649f35cfa2d57e1a60c959ec18c43a315efc4910f
-
SSDEEP
24576:pdGDyyUEuzp/rnemeg9Hm8b0tHZWTkQ4:5nMQMK0XD/
-
Detect Xworm Payload
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1