Behavioral task
behavioral1
Sample
2025-01-13_cd0fe66e185f029d32e80210b6b94b49_andromeda_aspxspy_darkbit_hacktools_houdini_jrat_ngrbot_.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2025-01-13_cd0fe66e185f029d32e80210b6b94b49_andromeda_aspxspy_darkbit_hacktools_houdini_jrat_ngrbot_.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-13_cd0fe66e185f029d32e80210b6b94b49_andromeda_aspxspy_darkbit_hacktools_houdini_jrat_ngrbot_piehop_pos_utkonos_wirefire_zxxz
-
Size
5.0MB
-
MD5
cd0fe66e185f029d32e80210b6b94b49
-
SHA1
ea8b8f5f85259a16226e31cac6c4c4effee8d4c4
-
SHA256
d926eadaed8927d5fe6c6fecb682d4d29c2bad2971cc0c02fe7394e97cb7d186
-
SHA512
40a66325cb4c8b3c19f115ef8a94ade1acf692ef3bffe1db50d11c5f64758e84d48e73a63c9c944e0af165c17680fbcfc45980e55a7fda6a8210089c56c6582e
-
SSDEEP
49152:0M1gOHfpW3raYcXiZxMfgpyZ8HC85G/3NwwhJtRq0LcLmkKcWUk3:51gyD5
Malware Config
Signatures
-
888rat family
-
Android 888 RAT payload 1 IoCs
resource yara_rule sample family_888rat -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-01-13_cd0fe66e185f029d32e80210b6b94b49_andromeda_aspxspy_darkbit_hacktools_houdini_jrat_ngrbot_piehop_pos_utkonos_wirefire_zxxz -
Office document contains embedded OLE objects 1 IoCs
Detected embedded OLE objects in Office documents.
resource yara_rule sample office_ole_embedded
Files
-
2025-01-13_cd0fe66e185f029d32e80210b6b94b49_andromeda_aspxspy_darkbit_hacktools_houdini_jrat_ngrbot_piehop_pos_utkonos_wirefire_zxxz.exe .js windows:5 windows x86 arch:x86 polyglot
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.xray Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE