General
-
Target
a4b89da90c002a6cb2753c9eaa2655de.exe
-
Size
31KB
-
Sample
210513-rscgxpkc1s
-
MD5
a4b89da90c002a6cb2753c9eaa2655de
-
SHA1
11e80ffcc3bb1d9711aa46a6c0b9d21567a3e44a
-
SHA256
917ef72731455e80e3d49b198924d5810e539984bb6c6dbd238d518ed284d8c5
-
SHA512
421e0dd6660aeed60c6a5eea58bf5c4cfd6cebbdc4d9abca2d8a335bf3ba68afe7121eef45dec7a5bd46354a19cc815eb562337833e460c027c08e85887764dd
Static task
static1
Behavioral task
behavioral1
Sample
a4b89da90c002a6cb2753c9eaa2655de.exe
Resource
win7v20210410
Malware Config
Extracted
njrat
0.7d
MyBot
4.tcp.ngrok.io:12601
ff9559ce9f577731b47f4f094b63f540
-
reg_key
ff9559ce9f577731b47f4f094b63f540
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
a4b89da90c002a6cb2753c9eaa2655de.exe
-
Size
31KB
-
MD5
a4b89da90c002a6cb2753c9eaa2655de
-
SHA1
11e80ffcc3bb1d9711aa46a6c0b9d21567a3e44a
-
SHA256
917ef72731455e80e3d49b198924d5810e539984bb6c6dbd238d518ed284d8c5
-
SHA512
421e0dd6660aeed60c6a5eea58bf5c4cfd6cebbdc4d9abca2d8a335bf3ba68afe7121eef45dec7a5bd46354a19cc815eb562337833e460c027c08e85887764dd
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-