General
-
Target
b166e1947e977864e55349d8358197927a7f7ee707ddf46acf027b7cf109bf98
-
Size
37KB
-
Sample
211219-r67zvshdbj
-
MD5
756b5288c29c75f8a689cf1010ddbe25
-
SHA1
6b0f81673af9c4bb6dc6f7fd275679ebfa46a756
-
SHA256
b166e1947e977864e55349d8358197927a7f7ee707ddf46acf027b7cf109bf98
-
SHA512
a515d02bda13ea9b06287a5a73cf08aef0d9907a1800cede4f3e314597264475ceccaa3f4e3c0fe769aaef0ee6f52d1cf1dbb98a80a22a83cd0582159311df8e
Behavioral task
behavioral1
Sample
b166e1947e977864e55349d8358197927a7f7ee707ddf46acf027b7cf109bf98.exe
Resource
win10-en-20211208
Malware Config
Extracted
njrat
im523
pidor
8.tcp.ngrok.io:12086:12086
1b6ef007d35ce987ac4dec265faa179b
-
reg_key
1b6ef007d35ce987ac4dec265faa179b
-
splitter
|'|'|
Targets
-
-
Target
b166e1947e977864e55349d8358197927a7f7ee707ddf46acf027b7cf109bf98
-
Size
37KB
-
MD5
756b5288c29c75f8a689cf1010ddbe25
-
SHA1
6b0f81673af9c4bb6dc6f7fd275679ebfa46a756
-
SHA256
b166e1947e977864e55349d8358197927a7f7ee707ddf46acf027b7cf109bf98
-
SHA512
a515d02bda13ea9b06287a5a73cf08aef0d9907a1800cede4f3e314597264475ceccaa3f4e3c0fe769aaef0ee6f52d1cf1dbb98a80a22a83cd0582159311df8e
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-