General
-
Target
CF75D51EC31D817017D71DBE8DEF69D443E4ECCA131E7.exe
-
Size
398KB
-
Sample
210911-htsvqsbbb6
-
MD5
61522f3e0ff5ffcd3b70af0969ce67ff
-
SHA1
055acee75181881b27e6c489b85efc530ed2a145
-
SHA256
cf75d51ec31d817017d71dbe8def69d443e4ecca131e70ca6252ebc455e065a2
-
SHA512
650da92d3c10f8649253016c721a7c522b213342913c134303a843aedee51e10e77a6913a8fe707a26b895d606dd2d362a5eba14de25c5f90a5eee1f8f8defd8
Static task
static1
Behavioral task
behavioral1
Sample
CF75D51EC31D817017D71DBE8DEF69D443E4ECCA131E7.exe
Resource
win7-en
Malware Config
Extracted
njrat
0.7d
Lammer
hacktrojancy.ddns.net:1177
d4edd1f042d4d9678bd0e6fffb41b44f
-
reg_key
d4edd1f042d4d9678bd0e6fffb41b44f
-
splitter
|'|'|
Extracted
njrat
0.7d
aaa
0.tcp.ngrok.io:18926
25cfdc389bb9a2acd67334f0453faa4c
-
reg_key
25cfdc389bb9a2acd67334f0453faa4c
-
splitter
|'|'|
Targets
-
-
Target
CF75D51EC31D817017D71DBE8DEF69D443E4ECCA131E7.exe
-
Size
398KB
-
MD5
61522f3e0ff5ffcd3b70af0969ce67ff
-
SHA1
055acee75181881b27e6c489b85efc530ed2a145
-
SHA256
cf75d51ec31d817017d71dbe8def69d443e4ecca131e70ca6252ebc455e065a2
-
SHA512
650da92d3c10f8649253016c721a7c522b213342913c134303a843aedee51e10e77a6913a8fe707a26b895d606dd2d362a5eba14de25c5f90a5eee1f8f8defd8
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-