General
-
Target
acc5c7bf3d24c6156b7defab87f564f5.exe
-
Size
23KB
-
Sample
211210-14hfvsaba7
-
MD5
acc5c7bf3d24c6156b7defab87f564f5
-
SHA1
53abe0aa5938faed0fd1eec79e8ebe84be0be570
-
SHA256
fcdcfc11a385aaae03e3f31964503798eaa76a1ba726d17cb59ab440e155a5f6
-
SHA512
6c43825a7b6e118f0c71dd12d3693ed4c0e929a34cefbb0f4e2aa6e98cedf1d612495345e5da4bf68068342a41f66244dcb6c2d8d07958255dc94aff018613b6
Behavioral task
behavioral1
Sample
acc5c7bf3d24c6156b7defab87f564f5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
acc5c7bf3d24c6156b7defab87f564f5.exe
Resource
win10-en-20211208
Malware Config
Extracted
njrat
0.7d
HacKed
6.tcp.ngrok.io:14833
c6f306bc6c878b6dcab17d402884bb5d
-
reg_key
c6f306bc6c878b6dcab17d402884bb5d
-
splitter
|'|'|
Targets
-
-
Target
acc5c7bf3d24c6156b7defab87f564f5.exe
-
Size
23KB
-
MD5
acc5c7bf3d24c6156b7defab87f564f5
-
SHA1
53abe0aa5938faed0fd1eec79e8ebe84be0be570
-
SHA256
fcdcfc11a385aaae03e3f31964503798eaa76a1ba726d17cb59ab440e155a5f6
-
SHA512
6c43825a7b6e118f0c71dd12d3693ed4c0e929a34cefbb0f4e2aa6e98cedf1d612495345e5da4bf68068342a41f66244dcb6c2d8d07958255dc94aff018613b6
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-