General
-
Target
8320F6171990184F84338329DAE465E33EF90E1A9584E.exe
-
Size
23KB
-
Sample
211001-p9jekabhb9
-
MD5
a873745adb5279248a7ea3cccff26c3c
-
SHA1
551fb96900684f790fca3b2b837d1c88ef0508dc
-
SHA256
8320f6171990184f84338329dae465e33ef90e1a9584e7087b226d682b8e1594
-
SHA512
09d94e876577cd9c1ae164bb6bfa94fc440482f2fc5e775b6d7222508ad4ef53697f2164044b30789d7a2cf4f703a98d4958968c7cd774811a89a2188310b87f
Behavioral task
behavioral1
Sample
8320F6171990184F84338329DAE465E33EF90E1A9584E.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
8320F6171990184F84338329DAE465E33EF90E1A9584E.exe
Resource
win10v20210408
Malware Config
Extracted
njrat
0.7d
Lammer
6.tcp.ngrok.io:16860
142514b06c5331e576c2b748ba1ec681
-
reg_key
142514b06c5331e576c2b748ba1ec681
-
splitter
|'|'|
Targets
-
-
Target
8320F6171990184F84338329DAE465E33EF90E1A9584E.exe
-
Size
23KB
-
MD5
a873745adb5279248a7ea3cccff26c3c
-
SHA1
551fb96900684f790fca3b2b837d1c88ef0508dc
-
SHA256
8320f6171990184f84338329dae465e33ef90e1a9584e7087b226d682b8e1594
-
SHA512
09d94e876577cd9c1ae164bb6bfa94fc440482f2fc5e775b6d7222508ad4ef53697f2164044b30789d7a2cf4f703a98d4958968c7cd774811a89a2188310b87f
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-