General
-
Target
b391dff3fa3c24f90d436a02dd0d2683.exe
-
Size
37KB
-
Sample
211211-ggv9naagf2
-
MD5
b391dff3fa3c24f90d436a02dd0d2683
-
SHA1
7e0fd1cd21941be2542ffb77d808b1dbd3c90566
-
SHA256
8f0041ef66cd6262fb4a1b5c05ed0c0fe5b17322bbb8394efd65fcbb33adfae3
-
SHA512
3a3d025d3f8eade79808c801dc98938843627dba6a6a9e794dc4b0990d86caaf4ec308d3b479712f049eb4be23097dc3c79d7719bc0b634b425889857edf9282
Behavioral task
behavioral1
Sample
b391dff3fa3c24f90d436a02dd0d2683.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b391dff3fa3c24f90d436a02dd0d2683.exe
Resource
win10-en-20211208
Malware Config
Extracted
njrat
im523
HacKed
2.tcp.ngrok.io:16295
59596196f8ae2919cd21fc46c7e7acf0
-
reg_key
59596196f8ae2919cd21fc46c7e7acf0
-
splitter
|'|'|
Targets
-
-
Target
b391dff3fa3c24f90d436a02dd0d2683.exe
-
Size
37KB
-
MD5
b391dff3fa3c24f90d436a02dd0d2683
-
SHA1
7e0fd1cd21941be2542ffb77d808b1dbd3c90566
-
SHA256
8f0041ef66cd6262fb4a1b5c05ed0c0fe5b17322bbb8394efd65fcbb33adfae3
-
SHA512
3a3d025d3f8eade79808c801dc98938843627dba6a6a9e794dc4b0990d86caaf4ec308d3b479712f049eb4be23097dc3c79d7719bc0b634b425889857edf9282
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-