General
-
Target
50ebed086e84460278fdc76569f77dd8
-
Size
23KB
-
Sample
201214-fampbwbc7e
-
MD5
50ebed086e84460278fdc76569f77dd8
-
SHA1
7fddfcde981473aa1a01ba75bc378b0a5e21decb
-
SHA256
14f837bcd3aee5cfc35e4f7d09dab2f92248f588936c12cd0388419528e84165
-
SHA512
39f61925b794df1c76318422a283ac9d07d9afa2bf68908f8fb0c772b098bea80db26eedfaaad60dba6e2eb504148c519b35a9a94407ede99bc45a35b0b9b1c8
Static task
static1
Behavioral task
behavioral1
Sample
50ebed086e84460278fdc76569f77dd8.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
50ebed086e84460278fdc76569f77dd8.exe
Resource
win10v20201028
Malware Config
Extracted
njrat
0.7d
HacKed
son1.ddns.net:1177
1b1073521708658cc521193d85ed3567
-
reg_key
1b1073521708658cc521193d85ed3567
-
splitter
|'|'|
Targets
-
-
Target
50ebed086e84460278fdc76569f77dd8
-
Size
23KB
-
MD5
50ebed086e84460278fdc76569f77dd8
-
SHA1
7fddfcde981473aa1a01ba75bc378b0a5e21decb
-
SHA256
14f837bcd3aee5cfc35e4f7d09dab2f92248f588936c12cd0388419528e84165
-
SHA512
39f61925b794df1c76318422a283ac9d07d9afa2bf68908f8fb0c772b098bea80db26eedfaaad60dba6e2eb504148c519b35a9a94407ede99bc45a35b0b9b1c8
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-