General
-
Target
Kaspersky.exe
-
Size
93KB
-
Sample
250329-pedktssyh1
-
MD5
3060fc299e17c7783df72a4e5f031f39
-
SHA1
2b1a867cf9dd435670d3c638974b4ad3c4a6ac87
-
SHA256
cc3766508cfe6674d7c5a3008353ad24aa7e50c576a77b31e26985bd7aee5aa0
-
SHA512
490a2728a54d021e2834332b8a1cc37475486794a2eef27c974a587ede72e1ca4672e3d0f05c646c954f4f4760c12a13f9cd901b816436ca20690ad14f904aa2
-
SSDEEP
1536:HV/r7EkrjaFIs7E5OxzJn8njEwzGi1dDjDzgS:HV7jau5OVVLi1drs
Behavioral task
behavioral1
Sample
Kaspersky.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
0.7d
Pupsik
hakim32.ddns.net:2000
7.tcp.eu.ngrok.io:10780
83252676f26e0ab65853f7859226c726
-
reg_key
83252676f26e0ab65853f7859226c726
-
splitter
|'|'|
Targets
-
-
Target
Kaspersky.exe
-
Size
93KB
-
MD5
3060fc299e17c7783df72a4e5f031f39
-
SHA1
2b1a867cf9dd435670d3c638974b4ad3c4a6ac87
-
SHA256
cc3766508cfe6674d7c5a3008353ad24aa7e50c576a77b31e26985bd7aee5aa0
-
SHA512
490a2728a54d021e2834332b8a1cc37475486794a2eef27c974a587ede72e1ca4672e3d0f05c646c954f4f4760c12a13f9cd901b816436ca20690ad14f904aa2
-
SSDEEP
1536:HV/r7EkrjaFIs7E5OxzJn8njEwzGi1dDjDzgS:HV7jau5OVVLi1drs
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1