General

  • Target

    287e892aeb4be05c881e19da227d0398cd321d5a9af837932c12dfaab641b4cb.jar

  • Size

    14.5MB

  • Sample

    241028-x8ap2awalq

  • MD5

    29fd6772aafb08c90b1ff9a91f48ecff

  • SHA1

    39628a8412e0a14126da2bfa5fbe7af5069e1eec

  • SHA256

    287e892aeb4be05c881e19da227d0398cd321d5a9af837932c12dfaab641b4cb

  • SHA512

    4d75584621d843d16ed97986e123be2751478e8047ac43a8a722daa3a548a2833293f0cc86ae9c229b4a2df2ae9a69e7e3ce3333da3696c48a4712d52950173e

  • SSDEEP

    393216:hU+MrvMUXlIm0QEiK4JISelo4pOT0w03Bl:hSIelIvgJYlIIF3/

Malware Config

Targets

    • Target

      287e892aeb4be05c881e19da227d0398cd321d5a9af837932c12dfaab641b4cb.jar

    • Size

      14.5MB

    • MD5

      29fd6772aafb08c90b1ff9a91f48ecff

    • SHA1

      39628a8412e0a14126da2bfa5fbe7af5069e1eec

    • SHA256

      287e892aeb4be05c881e19da227d0398cd321d5a9af837932c12dfaab641b4cb

    • SHA512

      4d75584621d843d16ed97986e123be2751478e8047ac43a8a722daa3a548a2833293f0cc86ae9c229b4a2df2ae9a69e7e3ce3333da3696c48a4712d52950173e

    • SSDEEP

      393216:hU+MrvMUXlIm0QEiK4JISelo4pOT0w03Bl:hSIelIvgJYlIIF3/

    • Dynamic RAT payload

    • DynamicRat

      DynamicRat is a remote access trojan malware written in Java.

    • Dynamicrat family

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks