General
-
Target
Kaspersky.exe
-
Size
93KB
-
Sample
250329-nkzvksstgs
-
MD5
ab54e6c36ce4c5f741468fad657919e5
-
SHA1
39c0e66f651549f517b87bf1b8932f8e91dbeb23
-
SHA256
4ab6bea1ec09fdb63490036d754206d66b5ed12d2242519e0b24e41ed07a6c89
-
SHA512
a65052fbaa1f13d7d0fe1afb21b3921eaf4b2504170d6834b59165cb1636221d02bd16df81a972a2eb12c9238362a93be08541224da6b01efc4480610a10b4cc
-
SSDEEP
768:zY37g530YTXspgM0m2zGjpyDtdXWuDtXfLWh2XxrjEtCdnl2pi1Rz4Rk3ssGdpH3:agZ0AA0mT1mrWgLljEwzGi1dDkDHgS
Behavioral task
behavioral1
Sample
Kaspersky.exe
Resource
win10ltsc2021-20250313-en
Malware Config
Extracted
njrat
0.7d
Pupsik
hakim32.ddns.net:2000
0.tcp.eu.ngrok.io:18053
0c4b3e15737b6964ecad2024f0474129
-
reg_key
0c4b3e15737b6964ecad2024f0474129
-
splitter
|'|'|
Targets
-
-
Target
Kaspersky.exe
-
Size
93KB
-
MD5
ab54e6c36ce4c5f741468fad657919e5
-
SHA1
39c0e66f651549f517b87bf1b8932f8e91dbeb23
-
SHA256
4ab6bea1ec09fdb63490036d754206d66b5ed12d2242519e0b24e41ed07a6c89
-
SHA512
a65052fbaa1f13d7d0fe1afb21b3921eaf4b2504170d6834b59165cb1636221d02bd16df81a972a2eb12c9238362a93be08541224da6b01efc4480610a10b4cc
-
SSDEEP
768:zY37g530YTXspgM0m2zGjpyDtdXWuDtXfLWh2XxrjEtCdnl2pi1Rz4Rk3ssGdpH3:agZ0AA0mT1mrWgLljEwzGi1dDkDHgS
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1