General
-
Target
b43b1abc6a39ce45305c6e946b20e698.exe
-
Size
7.6MB
-
Sample
211209-pqnj6sdcdl
-
MD5
b43b1abc6a39ce45305c6e946b20e698
-
SHA1
af7cc28f1d57ca4f50c816de6d13c3e505e84487
-
SHA256
101af417f59a62ab91bc1ad215a123ce42fc4b055390b2de038f21cb145c2fe0
-
SHA512
42c72ff81e52ffbebd301341a26c12c09c2d7e2cf9a5b28e77b4bd2be0b7465c9f5f132795c3856fc51488a2a806c229eb9931980c8e158ba57df34dcd59c68c
Static task
static1
Behavioral task
behavioral1
Sample
b43b1abc6a39ce45305c6e946b20e698.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b43b1abc6a39ce45305c6e946b20e698.exe
Resource
win10-en-20211208
Malware Config
Extracted
njrat
im523
Azure
rere12.hopto.org,rere12.hopto.org,rere12.hopto.org:4444
1da5a59a490612618a83aad15693bcfc
-
reg_key
1da5a59a490612618a83aad15693bcfc
-
splitter
|'|'|
Targets
-
-
Target
b43b1abc6a39ce45305c6e946b20e698.exe
-
Size
7.6MB
-
MD5
b43b1abc6a39ce45305c6e946b20e698
-
SHA1
af7cc28f1d57ca4f50c816de6d13c3e505e84487
-
SHA256
101af417f59a62ab91bc1ad215a123ce42fc4b055390b2de038f21cb145c2fe0
-
SHA512
42c72ff81e52ffbebd301341a26c12c09c2d7e2cf9a5b28e77b4bd2be0b7465c9f5f132795c3856fc51488a2a806c229eb9931980c8e158ba57df34dcd59c68c
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-