General
-
Target
84c34b6c0b92ad5759a512d6846a98b2.exe
-
Size
31KB
-
Sample
210507-bqm7een7nj
-
MD5
84c34b6c0b92ad5759a512d6846a98b2
-
SHA1
7fa7e252916780fd92615e55626e4bea368c4dbe
-
SHA256
d62f0e86c54f465b93bdab28f2ccc770999db63f8c69c937afcf66f9029eae3f
-
SHA512
9737aa7437d3e3dd430903687a8fb560907c481537e202d54d28f76565fdef3a4d0d2f71b29bfc86a1d9ecbba40bdd70582dcba4cf7ba80612dd39d0d4529cc1
Static task
static1
Behavioral task
behavioral1
Sample
84c34b6c0b92ad5759a512d6846a98b2.exe
Resource
win7v20210408
Malware Config
Extracted
njrat
0.7d
MyBot
6.tcp.ngrok.io:12194
5f00a5bd21bef453c3bb48de1a4c154f
-
reg_key
5f00a5bd21bef453c3bb48de1a4c154f
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
84c34b6c0b92ad5759a512d6846a98b2.exe
-
Size
31KB
-
MD5
84c34b6c0b92ad5759a512d6846a98b2
-
SHA1
7fa7e252916780fd92615e55626e4bea368c4dbe
-
SHA256
d62f0e86c54f465b93bdab28f2ccc770999db63f8c69c937afcf66f9029eae3f
-
SHA512
9737aa7437d3e3dd430903687a8fb560907c481537e202d54d28f76565fdef3a4d0d2f71b29bfc86a1d9ecbba40bdd70582dcba4cf7ba80612dd39d0d4529cc1
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-