General
-
Target
92d0a1a1b5eaf3f8624d4f2e39e2de26
-
Size
23KB
-
Sample
201214-ch2dpwv9gn
-
MD5
92d0a1a1b5eaf3f8624d4f2e39e2de26
-
SHA1
21dc02d8bf484c464bfb1c39cfe26bdbb56ea0ac
-
SHA256
dd562a2d51ffcf2c9f56779211e8bd1b22899d7448cb544e73c1baae4fcb811d
-
SHA512
32652c97a839a601c06883672bbda393ee0db31f6497fb7a1fda407c72144087a365236f7e6db1fad2b000f5de4d880498bbfcd3437efacf39650e720f020d78
Static task
static1
Behavioral task
behavioral1
Sample
92d0a1a1b5eaf3f8624d4f2e39e2de26.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
92d0a1a1b5eaf3f8624d4f2e39e2de26.exe
Resource
win10v20201028
Malware Config
Extracted
njrat
0.7d
HacKed
10.10.10.10:5552
e3c9dc0133333258fa0ebe7ab4bdc72d
-
reg_key
e3c9dc0133333258fa0ebe7ab4bdc72d
-
splitter
|'|'|
Targets
-
-
Target
92d0a1a1b5eaf3f8624d4f2e39e2de26
-
Size
23KB
-
MD5
92d0a1a1b5eaf3f8624d4f2e39e2de26
-
SHA1
21dc02d8bf484c464bfb1c39cfe26bdbb56ea0ac
-
SHA256
dd562a2d51ffcf2c9f56779211e8bd1b22899d7448cb544e73c1baae4fcb811d
-
SHA512
32652c97a839a601c06883672bbda393ee0db31f6497fb7a1fda407c72144087a365236f7e6db1fad2b000f5de4d880498bbfcd3437efacf39650e720f020d78
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-