General
-
Target
23f046f284a367fc1f2d0444f1f9508602b84a528593d209246d8ec987165d60
-
Size
769KB
-
Sample
211216-czcg2sbba5
-
MD5
fd08b4818cca94554574c5e7a3c5a57d
-
SHA1
64c66820b0caa0bfda38230c269679bd7dbe66ef
-
SHA256
23f046f284a367fc1f2d0444f1f9508602b84a528593d209246d8ec987165d60
-
SHA512
13591b28b3091386021a8337c058ec84bdce3eb1d59f5b87b2ea043a95d6bc0e8b0440956dbcbb4a67a204283449ce3e76bd7bc24c105306b8bc3ff992175a0c
Static task
static1
Behavioral task
behavioral1
Sample
23f046f284a367fc1f2d0444f1f9508602b84a528593d209246d8ec987165d60.exe
Resource
win10-en-20211208
Malware Config
Extracted
njrat
H
dreem.linkpc.net:7500
-
splitter
!'!@!'!
Targets
-
-
Target
23f046f284a367fc1f2d0444f1f9508602b84a528593d209246d8ec987165d60
-
Size
769KB
-
MD5
fd08b4818cca94554574c5e7a3c5a57d
-
SHA1
64c66820b0caa0bfda38230c269679bd7dbe66ef
-
SHA256
23f046f284a367fc1f2d0444f1f9508602b84a528593d209246d8ec987165d60
-
SHA512
13591b28b3091386021a8337c058ec84bdce3eb1d59f5b87b2ea043a95d6bc0e8b0440956dbcbb4a67a204283449ce3e76bd7bc24c105306b8bc3ff992175a0c
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of SetThreadContext
-