General
-
Target
2024-11-02_ad704f4d50d21e895c9cfcb8d78afdc6_cobian_krakencryptor
-
Size
10.2MB
-
Sample
241102-ptjqdsthqg
-
MD5
ad704f4d50d21e895c9cfcb8d78afdc6
-
SHA1
28cf5bad8f3bc495be1f966238289556de59fc05
-
SHA256
030a17891ab814bdb6a92285a0c92443b5cf797551c3346dc98a4fd65d856d24
-
SHA512
046ba78deafbe60ab87a0014a8ae5c32ae0a49df873ae899a96aaa634708591dd280600e1649ebd3159003821f337fc1cdae894bde8add3baca7f4d40a54f146
-
SSDEEP
196608:GwfrvAXkRHbisSjRjnV9RB6PAx0WZHCWYSl/95DW:xrdR7IRjn3uODNnPhW
Behavioral task
behavioral1
Sample
2024-11-02_ad704f4d50d21e895c9cfcb8d78afdc6_cobian_krakencryptor.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-02_ad704f4d50d21e895c9cfcb8d78afdc6_cobian_krakencryptor.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v2.0
HacKed
127.0.0.1:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
2024-11-02_ad704f4d50d21e895c9cfcb8d78afdc6_cobian_krakencryptor
-
Size
10.2MB
-
MD5
ad704f4d50d21e895c9cfcb8d78afdc6
-
SHA1
28cf5bad8f3bc495be1f966238289556de59fc05
-
SHA256
030a17891ab814bdb6a92285a0c92443b5cf797551c3346dc98a4fd65d856d24
-
SHA512
046ba78deafbe60ab87a0014a8ae5c32ae0a49df873ae899a96aaa634708591dd280600e1649ebd3159003821f337fc1cdae894bde8add3baca7f4d40a54f146
-
SSDEEP
196608:GwfrvAXkRHbisSjRjnV9RB6PAx0WZHCWYSl/95DW:xrdR7IRjn3uODNnPhW
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1