General
-
Target
db404d344d12678f7213b44048818c17.exe
-
Size
37KB
-
Sample
211114-ws6xvsdfen
-
MD5
db404d344d12678f7213b44048818c17
-
SHA1
7772297858581e8baa9b1546e8dd06fd255f0219
-
SHA256
8c4909cf7dc12e6724f7cbb4f095d366237a93ce25c6eedde1ff435aba588c68
-
SHA512
0f674d3af53ba86bacec2ab25da57887fac0f490a95e5b60e2bad99f31e8bc5f7a98105ab3ae532e6b3852657d79630d0b67bc3d5f87326cdb3e8ad91cfce8ad
Behavioral task
behavioral1
Sample
db404d344d12678f7213b44048818c17.exe
Resource
win7-en-20211104
Malware Config
Extracted
njrat
im523
HacKed
efficient-oil.auto.playit.gg:55457
b5058363d72546b0d0159499b17dedd9
-
reg_key
b5058363d72546b0d0159499b17dedd9
-
splitter
|'|'|
Targets
-
-
Target
db404d344d12678f7213b44048818c17.exe
-
Size
37KB
-
MD5
db404d344d12678f7213b44048818c17
-
SHA1
7772297858581e8baa9b1546e8dd06fd255f0219
-
SHA256
8c4909cf7dc12e6724f7cbb4f095d366237a93ce25c6eedde1ff435aba588c68
-
SHA512
0f674d3af53ba86bacec2ab25da57887fac0f490a95e5b60e2bad99f31e8bc5f7a98105ab3ae532e6b3852657d79630d0b67bc3d5f87326cdb3e8ad91cfce8ad
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-