General
-
Target
306437A282F51A0C6ECD6E3EAAB2EF9FC376973DA40AE.exe
-
Size
27KB
-
Sample
220102-xhg2esafg6
-
MD5
03aaaf240a48f950913695178125016a
-
SHA1
b7fe1523b02d05539f769f4beead332e5f0e18bc
-
SHA256
306437a282f51a0c6ecd6e3eaab2ef9fc376973da40ae0972bee7ea3839d0909
-
SHA512
6af11725e06efd01ca1429e567ca93d608436b165a23229eea623e25291967ce3f057af5c596974d86a5e0c55b38a27a0b121471f2b49cd25c543e77ce09460d
Behavioral task
behavioral1
Sample
306437A282F51A0C6ECD6E3EAAB2EF9FC376973DA40AE.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
306437A282F51A0C6ECD6E3EAAB2EF9FC376973DA40AE.exe
Resource
win10-en-20211208
Malware Config
Extracted
njrat
v2.0
HacKed
zaki-botnet.portmap.host:5222
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
306437A282F51A0C6ECD6E3EAAB2EF9FC376973DA40AE.exe
-
Size
27KB
-
MD5
03aaaf240a48f950913695178125016a
-
SHA1
b7fe1523b02d05539f769f4beead332e5f0e18bc
-
SHA256
306437a282f51a0c6ecd6e3eaab2ef9fc376973da40ae0972bee7ea3839d0909
-
SHA512
6af11725e06efd01ca1429e567ca93d608436b165a23229eea623e25291967ce3f057af5c596974d86a5e0c55b38a27a0b121471f2b49cd25c543e77ce09460d
Score10/10-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-