General
-
Target
3daf792075ad0eeacae676b0d7f80a68.exe
-
Size
31KB
-
Sample
210508-vkt9nn4jls
-
MD5
3daf792075ad0eeacae676b0d7f80a68
-
SHA1
7b2da0cac13461f09bfba7fad96253e517098ce7
-
SHA256
cd6e990e83a947ee95fc38e33ef891fcd2adca0c669eba160cca49895471663a
-
SHA512
da79cfb46e336d052353311cb0fb8a2b151c3f390dfe37dff008d6a8f3dcb09ceaa6c98a3d3c7174aefb0a900a77767c03cbc8742465b9cc75fd8e2847064bff
Static task
static1
Behavioral task
behavioral1
Sample
3daf792075ad0eeacae676b0d7f80a68.exe
Resource
win7v20210410
Malware Config
Extracted
njrat
0.7d
MyBot
6.tcp.ngrok.io:12336
442e245fdc9bd3433e2f89240f0d3737
-
reg_key
442e245fdc9bd3433e2f89240f0d3737
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
3daf792075ad0eeacae676b0d7f80a68.exe
-
Size
31KB
-
MD5
3daf792075ad0eeacae676b0d7f80a68
-
SHA1
7b2da0cac13461f09bfba7fad96253e517098ce7
-
SHA256
cd6e990e83a947ee95fc38e33ef891fcd2adca0c669eba160cca49895471663a
-
SHA512
da79cfb46e336d052353311cb0fb8a2b151c3f390dfe37dff008d6a8f3dcb09ceaa6c98a3d3c7174aefb0a900a77767c03cbc8742465b9cc75fd8e2847064bff
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-