General
-
Target
0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b
-
Size
289KB
-
Sample
210922-rhdq4sfebn
-
MD5
347ff437bff7fd078a6aa65c04620b84
-
SHA1
4c5f2b093cc9be24b61c4d83502f409b1e757f20
-
SHA256
0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b
-
SHA512
deb2dd636fa554879e90763a060a5f66b247fbe49bc18c70bbdae8b298916527651113d7123619feaf09f87004507d0a0cf0bb54499149589f3ea9badf75836d
Behavioral task
behavioral1
Sample
0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b.exe
Resource
win7-en-20210920
Malware Config
Extracted
njrat
im523
Vlad
2.tcp.ngrok.io:18100
02970e07dff67a33e67ace6d6dbcc09f
-
reg_key
02970e07dff67a33e67ace6d6dbcc09f
-
splitter
|'|'|
Targets
-
-
Target
0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b
-
Size
289KB
-
MD5
347ff437bff7fd078a6aa65c04620b84
-
SHA1
4c5f2b093cc9be24b61c4d83502f409b1e757f20
-
SHA256
0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b
-
SHA512
deb2dd636fa554879e90763a060a5f66b247fbe49bc18c70bbdae8b298916527651113d7123619feaf09f87004507d0a0cf0bb54499149589f3ea9badf75836d
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-