General
-
Target
27643633696fa248a0b4c71e49615434.exe
-
Size
31KB
-
Sample
210507-6s3nncjwvs
-
MD5
27643633696fa248a0b4c71e49615434
-
SHA1
649381492b07b574498b09fb8660594c01051860
-
SHA256
8a6cb8e4c30304c28e48f7b231566f6cb6b0003f333ad391182d9e60ad822f81
-
SHA512
a2d429ae10f5f1011d46f11599ee436b3497fda11910d8f10cba2508386b340da44d046925bbe419a26fe19b0bfb93eadb5f4458977f14dbd09b17f119845f5e
Static task
static1
Behavioral task
behavioral1
Sample
27643633696fa248a0b4c71e49615434.exe
Resource
win7v20210408
Malware Config
Extracted
njrat
0.7d
MyBot
4.tcp.ngrok.io:13423
5b1aa42c8adf5af0231d2d07c548dec2
-
reg_key
5b1aa42c8adf5af0231d2d07c548dec2
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
27643633696fa248a0b4c71e49615434.exe
-
Size
31KB
-
MD5
27643633696fa248a0b4c71e49615434
-
SHA1
649381492b07b574498b09fb8660594c01051860
-
SHA256
8a6cb8e4c30304c28e48f7b231566f6cb6b0003f333ad391182d9e60ad822f81
-
SHA512
a2d429ae10f5f1011d46f11599ee436b3497fda11910d8f10cba2508386b340da44d046925bbe419a26fe19b0bfb93eadb5f4458977f14dbd09b17f119845f5e
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-