General
-
Target
cfca60135ace947b42f62ac66f22c512.exe
-
Size
31KB
-
Sample
220110-kbvygsechj
-
MD5
cfca60135ace947b42f62ac66f22c512
-
SHA1
89d5914fa02ed618d4eb4fe4d6a8a601b41ec42b
-
SHA256
d26cea6912e11e87d9fa8782f69b01d38c4e8d40c9548341629b8281f9aa2ab0
-
SHA512
9a78a102b2c322ea92034d544357ba0abf0c281959f8af19d7c963e1056e13e10b37112bfac0f9043c631b92b65c6d9595685e7af981892f451dd55b86e257e5
Behavioral task
behavioral1
Sample
cfca60135ace947b42f62ac66f22c512.exe
Resource
win7-en-20211208
Malware Config
Extracted
njrat
0.7d
MyBot
0.tcp.ngrok.io:18994
9b8a3c55ddf9e26fc7191bb2a3876cd8
-
reg_key
9b8a3c55ddf9e26fc7191bb2a3876cd8
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
cfca60135ace947b42f62ac66f22c512.exe
-
Size
31KB
-
MD5
cfca60135ace947b42f62ac66f22c512
-
SHA1
89d5914fa02ed618d4eb4fe4d6a8a601b41ec42b
-
SHA256
d26cea6912e11e87d9fa8782f69b01d38c4e8d40c9548341629b8281f9aa2ab0
-
SHA512
9a78a102b2c322ea92034d544357ba0abf0c281959f8af19d7c963e1056e13e10b37112bfac0f9043c631b92b65c6d9595685e7af981892f451dd55b86e257e5
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-