General
-
Target
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe
-
Size
27KB
-
Sample
211222-yyw1ysghan
-
MD5
17342737aa4da913d168e0c7a8f97737
-
SHA1
92a62d7222236de3c089a1efa103dae56a56abd5
-
SHA256
1b5623a3835cd779d255c177b644fb731f093fc60c8e73e7fd57e2330e85c214
-
SHA512
eb46a1bef25797a0ebf035708e5654c2a6b6638d6399926144fc22b6b7e2d628b9ea8b7f381546e2e7ec15ac57901316613a6ca05d60033c9465a3e2bf9ab991
Behavioral task
behavioral1
Sample
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe
Resource
win10-en-20211208
Malware Config
Extracted
njrat
v2.0
HacKed
2.tcp.ngrok.io:10434
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe
-
Size
27KB
-
MD5
17342737aa4da913d168e0c7a8f97737
-
SHA1
92a62d7222236de3c089a1efa103dae56a56abd5
-
SHA256
1b5623a3835cd779d255c177b644fb731f093fc60c8e73e7fd57e2330e85c214
-
SHA512
eb46a1bef25797a0ebf035708e5654c2a6b6638d6399926144fc22b6b7e2d628b9ea8b7f381546e2e7ec15ac57901316613a6ca05d60033c9465a3e2bf9ab991
Score10/10-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-