General
-
Target
af5498fc7e4948739f2320fdd8cc7dc5.exe
-
Size
23KB
-
Sample
211022-xdjpfschfr
-
MD5
af5498fc7e4948739f2320fdd8cc7dc5
-
SHA1
3aa3c8c4126f60c4d1c2234feb03c62aaa9611a9
-
SHA256
1424f40ca88848f45446ad55cc6afe2f929339b7e239389818a1ce8bbaa1580d
-
SHA512
d264932154bb2238bbf613fa6aca76b2bbf58de65b61aabfee3e9459b60922387fc610a7d16ec9f12b9012a2e60d3c34e7456746e921ff7395651305ca4142ae
Behavioral task
behavioral1
Sample
af5498fc7e4948739f2320fdd8cc7dc5.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
af5498fc7e4948739f2320fdd8cc7dc5.exe
Resource
win10-en-20211014
Malware Config
Extracted
njrat
0.7d
HacKed
6.tcp.ngrok.io:15339
b5dc483fecb7c6984a665f97dcaabbda
-
reg_key
b5dc483fecb7c6984a665f97dcaabbda
-
splitter
|'|'|
Targets
-
-
Target
af5498fc7e4948739f2320fdd8cc7dc5.exe
-
Size
23KB
-
MD5
af5498fc7e4948739f2320fdd8cc7dc5
-
SHA1
3aa3c8c4126f60c4d1c2234feb03c62aaa9611a9
-
SHA256
1424f40ca88848f45446ad55cc6afe2f929339b7e239389818a1ce8bbaa1580d
-
SHA512
d264932154bb2238bbf613fa6aca76b2bbf58de65b61aabfee3e9459b60922387fc610a7d16ec9f12b9012a2e60d3c34e7456746e921ff7395651305ca4142ae
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-