General
-
Target
4cfe84d411747dfd7dea548fe279bb3e74042e12a658f08306c970bbfde5519d
-
Size
93KB
-
Sample
250214-2zqr4s1laz
-
MD5
9c58f76efce10297cfe0025e9fa379b9
-
SHA1
a8cc3aa5cd30dc6471d965248ebc9e99e38c4013
-
SHA256
4cfe84d411747dfd7dea548fe279bb3e74042e12a658f08306c970bbfde5519d
-
SHA512
05f626ec4752e503c19139c20d275f16621e91d7d7383975a2b7ed91622df384f8376b04ce0dca79177da87b40f225a9f31a051b29bb1474585dd2d01b837c81
-
SSDEEP
768:kY3zgnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3bsGn:3gxOx6baIa9ROj00ljEwzGi1dDnDrgS
Behavioral task
behavioral1
Sample
4cfe84d411747dfd7dea548fe279bb3e74042e12a658f08306c970bbfde5519d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4cfe84d411747dfd7dea548fe279bb3e74042e12a658f08306c970bbfde5519d.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:5552
25210401edf20bebda770f9604a6b3ec
-
reg_key
25210401edf20bebda770f9604a6b3ec
-
splitter
|'|'|
Targets
-
-
Target
4cfe84d411747dfd7dea548fe279bb3e74042e12a658f08306c970bbfde5519d
-
Size
93KB
-
MD5
9c58f76efce10297cfe0025e9fa379b9
-
SHA1
a8cc3aa5cd30dc6471d965248ebc9e99e38c4013
-
SHA256
4cfe84d411747dfd7dea548fe279bb3e74042e12a658f08306c970bbfde5519d
-
SHA512
05f626ec4752e503c19139c20d275f16621e91d7d7383975a2b7ed91622df384f8376b04ce0dca79177da87b40f225a9f31a051b29bb1474585dd2d01b837c81
-
SSDEEP
768:kY3zgnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3bsGn:3gxOx6baIa9ROj00ljEwzGi1dDnDrgS
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1