General
-
Target
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf
-
Size
23KB
-
Sample
201111-3sqec5lagn
-
MD5
c68fa9e0a6c46464ffc55536e04cd0cb
-
SHA1
46a01b1c1ed07b403704595b54da788f87758fba
-
SHA256
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf
-
SHA512
89c31eeba8ae22d34496584ddc4671e4b21f83ed54e16cd3e7f66fedd36dffa1915e7d2fbfcdf7cce4bf03d68cb77d53e7f03a6b42aa796bd35f506ce2952387
Static task
static1
Behavioral task
behavioral1
Sample
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf.exe
Resource
win10v20201028
Malware Config
Extracted
njrat
0.7d
cheat
4.tcp.ngrok.io:19451
efea00bfd82100063e3ba5f5434189d9
-
reg_key
efea00bfd82100063e3ba5f5434189d9
-
splitter
|'|'|
Targets
-
-
Target
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf
-
Size
23KB
-
MD5
c68fa9e0a6c46464ffc55536e04cd0cb
-
SHA1
46a01b1c1ed07b403704595b54da788f87758fba
-
SHA256
1b6f1fe005004eb302cc536bdb4841e2224ca706a9e6ed04ebc7cb86c4bb6ebf
-
SHA512
89c31eeba8ae22d34496584ddc4671e4b21f83ed54e16cd3e7f66fedd36dffa1915e7d2fbfcdf7cce4bf03d68cb77d53e7f03a6b42aa796bd35f506ce2952387
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-