General
-
Target
6838591f462c336b1acdcbb27304cc4c
-
Size
23KB
-
Sample
201214-bdpxpzj8g2
-
MD5
6838591f462c336b1acdcbb27304cc4c
-
SHA1
b4a48310ffbebb84d19f219dfcfdb18fcd254ccf
-
SHA256
92a125397e9023a9dda19c1d11a770c29f07b06b3b3d19e60a14d5584ce18ad4
-
SHA512
67708341db96e367717600ab549f145048e1a2ff3c113f41a814a55f7a3fba7ec3bcad340e76d7f1c3f1a673097c91aa6c4a7c19120cd223306d13f49421d1d6
Static task
static1
Behavioral task
behavioral1
Sample
6838591f462c336b1acdcbb27304cc4c.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
6838591f462c336b1acdcbb27304cc4c.exe
Resource
win10v20201028
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
279f6960ed84a752570aca7fb2dc1552
-
reg_key
279f6960ed84a752570aca7fb2dc1552
-
splitter
|'|'|
Targets
-
-
Target
6838591f462c336b1acdcbb27304cc4c
-
Size
23KB
-
MD5
6838591f462c336b1acdcbb27304cc4c
-
SHA1
b4a48310ffbebb84d19f219dfcfdb18fcd254ccf
-
SHA256
92a125397e9023a9dda19c1d11a770c29f07b06b3b3d19e60a14d5584ce18ad4
-
SHA512
67708341db96e367717600ab549f145048e1a2ff3c113f41a814a55f7a3fba7ec3bcad340e76d7f1c3f1a673097c91aa6c4a7c19120cd223306d13f49421d1d6
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-