General
-
Target
a872f0414e0834acab687a8beb9b3a6b.exe
-
Size
43KB
-
Sample
211026-je9elshghr
-
MD5
a872f0414e0834acab687a8beb9b3a6b
-
SHA1
3c5e60d56a0fe1378453e38ee4be9a589f3f6f83
-
SHA256
e5a4e8eda9d21d29b21f4d665823cdcbf9fb7004c8a4e6f74df126249b46c67f
-
SHA512
22c82bfdf3026e000bbbc2601598a55402ddcf73cdee1a36a94b2f2669bb9d2926f9dbb78d2d8a1be2c0b08c86b5085bc8e2971663e69ec8d559caf5088be8db
Behavioral task
behavioral1
Sample
a872f0414e0834acab687a8beb9b3a6b.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
a872f0414e0834acab687a8beb9b3a6b.exe
Resource
win10-en-20211014
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
???
0.tcp.ngrok.io:15651
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
a872f0414e0834acab687a8beb9b3a6b.exe
-
Size
43KB
-
MD5
a872f0414e0834acab687a8beb9b3a6b
-
SHA1
3c5e60d56a0fe1378453e38ee4be9a589f3f6f83
-
SHA256
e5a4e8eda9d21d29b21f4d665823cdcbf9fb7004c8a4e6f74df126249b46c67f
-
SHA512
22c82bfdf3026e000bbbc2601598a55402ddcf73cdee1a36a94b2f2669bb9d2926f9dbb78d2d8a1be2c0b08c86b5085bc8e2971663e69ec8d559caf5088be8db
Score10/10-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-