General
-
Target
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc
-
Size
3.3MB
-
Sample
210930-jzmfksghg9
-
MD5
a72d3ef38b9b0d80d375ac97883f7470
-
SHA1
2bc6af59a6790ad806863240cf64569e02809cc3
-
SHA256
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc
-
SHA512
ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40
Static task
static1
Behavioral task
behavioral1
Sample
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc.exe
Resource
win10-en-20210920
Malware Config
Extracted
njrat
v2.0
Hook
conqhook.ddns.net:6522
System
-
reg_key
System
-
splitter
|-F-|
Targets
-
-
Target
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc
-
Size
3.3MB
-
MD5
a72d3ef38b9b0d80d375ac97883f7470
-
SHA1
2bc6af59a6790ad806863240cf64569e02809cc3
-
SHA256
baf26fd01ae7499dc6fce1917bd2f61375fe80a570b4f26447c862d088e03ebc
-
SHA512
ce39a34b63de8c2ed8e4f1755deb1cda701295ca8fb94ef51440971956b20568a29bc6520e12068c345c010c8657df0374a4b2ac23fed15ffe40c2a15ef70f40
Score10/10-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-