General
-
Target
697a03588c4aa24e8b85ce0c55277d9ae65bf1b455125ecef64a83a3920449ef
-
Size
23KB
-
Sample
210228-35ltbrmthe
-
MD5
01d11cfd0296189005cd28010bea8997
-
SHA1
0b7eaab6ca85b0aea9ac059041ea3288221862d8
-
SHA256
697a03588c4aa24e8b85ce0c55277d9ae65bf1b455125ecef64a83a3920449ef
-
SHA512
a5b2676a60ae68e1f3729f4af092ac41e4f3edc288e53172f66a4b669f451619130978028c14436cd86d218ef46c79c4317d3b9cf873817d6b659778ddd42a3c
Static task
static1
Behavioral task
behavioral1
Sample
697a03588c4aa24e8b85ce0c55277d9ae65bf1b455125ecef64a83a3920449ef.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
697a03588c4aa24e8b85ce0c55277d9ae65bf1b455125ecef64a83a3920449ef.exe
Resource
win10v20201028
Malware Config
Extracted
njrat
0.7d
WirelessKey
552020.ddns.net:5552
52848614b130542748d8bc2310e8563e
-
reg_key
52848614b130542748d8bc2310e8563e
-
splitter
|'|'|
Targets
-
-
Target
697a03588c4aa24e8b85ce0c55277d9ae65bf1b455125ecef64a83a3920449ef
-
Size
23KB
-
MD5
01d11cfd0296189005cd28010bea8997
-
SHA1
0b7eaab6ca85b0aea9ac059041ea3288221862d8
-
SHA256
697a03588c4aa24e8b85ce0c55277d9ae65bf1b455125ecef64a83a3920449ef
-
SHA512
a5b2676a60ae68e1f3729f4af092ac41e4f3edc288e53172f66a4b669f451619130978028c14436cd86d218ef46c79c4317d3b9cf873817d6b659778ddd42a3c
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-