General
-
Target
3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe
-
Size
37KB
-
Sample
210914-cf9cnshfgk
-
MD5
7b6b31441c3a261f2ec5268bf9e265da
-
SHA1
44512e2339d0f6f0c5fdd09d39048e62e0337bc1
-
SHA256
3f24adf406a6b813670c31d2f77a4fab0c9f47e76697491807114d055c26b3d5
-
SHA512
d6c5fd06f7d2f079ad764c85d2fe7451b142f67743a4299ca17551eca03061262c0281853659b36a8bd52928230ace2e542f9211a14eaf8c86ba7b29d08afba2
Static task
static1
Behavioral task
behavioral1
Sample
3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe
Resource
win10v20210408
Malware Config
Extracted
njrat
im523
CYBERPRANK
0.tcp.ngrok.io:17402
6430e428892ae49edff74c714d359b22
-
reg_key
6430e428892ae49edff74c714d359b22
-
splitter
|'|'|
Targets
-
-
Target
3F24ADF406A6B813670C31D2F77A4FAB0C9F47E766974.exe
-
Size
37KB
-
MD5
7b6b31441c3a261f2ec5268bf9e265da
-
SHA1
44512e2339d0f6f0c5fdd09d39048e62e0337bc1
-
SHA256
3f24adf406a6b813670c31d2f77a4fab0c9f47e76697491807114d055c26b3d5
-
SHA512
d6c5fd06f7d2f079ad764c85d2fe7451b142f67743a4299ca17551eca03061262c0281853659b36a8bd52928230ace2e542f9211a14eaf8c86ba7b29d08afba2
Score10/10-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-