General
-
Target
1f07a7b203282b0ca58115fe2d75c99e
-
Size
1.3MB
-
Sample
211211-mbyqgscebp
-
MD5
1f07a7b203282b0ca58115fe2d75c99e
-
SHA1
6ed3158f23986d32347e3e82098f8139a50c9711
-
SHA256
a14adf3e5aa8fec3cfc100666185c53b5d67f706f17a1506672fd091c763df9a
-
SHA512
1e4703c2f4a48a401fbbbbb9bd8d02f359b4fc13f45b4b830ba0b7050fffe06740a90069c2e536f6b7b9b2d2695f171b8342d729438c25fa00269e3df6cc2d60
Static task
static1
Behavioral task
behavioral1
Sample
1f07a7b203282b0ca58115fe2d75c99e.exe
Resource
win7-en-20211208
Malware Config
Extracted
njrat
0.7d
HacKed
danielgomesb.hopto.org:5552
3b8f970743bdfa6173bc9a1d9725d148
-
reg_key
3b8f970743bdfa6173bc9a1d9725d148
-
splitter
|'|'|
Targets
-
-
Target
1f07a7b203282b0ca58115fe2d75c99e
-
Size
1.3MB
-
MD5
1f07a7b203282b0ca58115fe2d75c99e
-
SHA1
6ed3158f23986d32347e3e82098f8139a50c9711
-
SHA256
a14adf3e5aa8fec3cfc100666185c53b5d67f706f17a1506672fd091c763df9a
-
SHA512
1e4703c2f4a48a401fbbbbb9bd8d02f359b4fc13f45b4b830ba0b7050fffe06740a90069c2e536f6b7b9b2d2695f171b8342d729438c25fa00269e3df6cc2d60
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-