General
-
Target
Titan_Crypter_Cracked.7z
-
Size
17.6MB
-
Sample
241203-sd8w5azndz
-
MD5
55a7f8f8b28c1ab8eda552de7071b75f
-
SHA1
8da38fc369c78d2f972c599631e4c3dd1032fff6
-
SHA256
483c6ff2b0dff0d91196eb8cdb4a4cf67d6ead53b1645bc03cf7b88f8da5e22b
-
SHA512
010e9d7a6c012123b2c05e8bb4411e72478c05223d3ec143ac685107405dcc6db05e779799f8db691b77bf93356a2644a5ace5a06daeaf1ce5165302c20d80f7
-
SSDEEP
393216:v1S0Cxjjva2q3vgQ7Pb75AYTSn7oQMJ08gHAyZJN1uSge:9S0gjG22vgQ7T6xn1MJdGAyZJCW
Behavioral task
behavioral1
Sample
Titan_Crypter_Cracked.7z
Resource
win7-20240708-en
Malware Config
Extracted
strrat
mpcmdrun.ydns.eu:10000
defender.ydns.eu:9999
-
license_id
khonsari
-
plugins_url
http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5
-
scheduled_task
false
-
secondary_startup
true
-
startup
true
Extracted
njrat
0.7NC
NYAN CAT
defender.ydns.eu:5553
1e54a3f07fbc4a28bf3
-
reg_key
1e54a3f07fbc4a28bf3
-
splitter
@!#&^%$
Targets
-
-
Target
Titan_Crypter_Cracked.7z
-
Size
17.6MB
-
MD5
55a7f8f8b28c1ab8eda552de7071b75f
-
SHA1
8da38fc369c78d2f972c599631e4c3dd1032fff6
-
SHA256
483c6ff2b0dff0d91196eb8cdb4a4cf67d6ead53b1645bc03cf7b88f8da5e22b
-
SHA512
010e9d7a6c012123b2c05e8bb4411e72478c05223d3ec143ac685107405dcc6db05e779799f8db691b77bf93356a2644a5ace5a06daeaf1ce5165302c20d80f7
-
SSDEEP
393216:v1S0Cxjjva2q3vgQ7Pb75AYTSn7oQMJ08gHAyZJN1uSge:9S0gjG22vgQ7T6xn1MJdGAyZJCW
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Njrat family
-
Strrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1