General
-
Target
41FEAB5AEC2ECE21D9A72911C82AE177.exe
-
Size
23KB
-
Sample
210906-1z3k8sbea9
-
MD5
41feab5aec2ece21d9a72911c82ae177
-
SHA1
53ae7e16b5ee073904a2b1f95ac85acbff93c00e
-
SHA256
56ceb4578f1fdeed73868bba77e46c0bbef65c101530bcef3a9257d15ec0b456
-
SHA512
cbe373277b85ad46c4fe70f990361a496e5b7152bb2ab7a868f1d37687bfc3cf5421ae894bd697c423da1c3210d412d3fd4c208f294493fb0d4d79e6a347342d
Behavioral task
behavioral1
Sample
41FEAB5AEC2ECE21D9A72911C82AE177.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
41FEAB5AEC2ECE21D9A72911C82AE177.exe
Resource
win10v20210408
Malware Config
Extracted
njrat
0.7d
victima
8.tcp.ngrok.io:16534
03ef0a44d2c926e2d1efdd377b33c634
-
reg_key
03ef0a44d2c926e2d1efdd377b33c634
-
splitter
|'|'|
Targets
-
-
Target
41FEAB5AEC2ECE21D9A72911C82AE177.exe
-
Size
23KB
-
MD5
41feab5aec2ece21d9a72911c82ae177
-
SHA1
53ae7e16b5ee073904a2b1f95ac85acbff93c00e
-
SHA256
56ceb4578f1fdeed73868bba77e46c0bbef65c101530bcef3a9257d15ec0b456
-
SHA512
cbe373277b85ad46c4fe70f990361a496e5b7152bb2ab7a868f1d37687bfc3cf5421ae894bd697c423da1c3210d412d3fd4c208f294493fb0d4d79e6a347342d
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-