General
-
Target
e56578ff67914010aa9f663876b66c4a
-
Size
37KB
-
Sample
220114-tls2bahdem
-
MD5
e56578ff67914010aa9f663876b66c4a
-
SHA1
802b5d9f5be9fb8213b97567ebc1910e85ddd20f
-
SHA256
fc89c98b5be515bcbd365c74a9f4026d2d8dce04f9bc6255cc327b971c0bd407
-
SHA512
756b0fdfca550346207ddd292f6fa57d4db2e0207850dd9651edc341e716f80102ff6e8bdcf8fc000ce8535a1439c529b57d26313b58ad8613d99a978c17caf3
Behavioral task
behavioral1
Sample
e56578ff67914010aa9f663876b66c4a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e56578ff67914010aa9f663876b66c4a.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
njrat
im523
Furios
gghosting221.ddns.net:6202
5f458dd5f03f50e31781ca69de125d55
-
reg_key
5f458dd5f03f50e31781ca69de125d55
-
splitter
|'|'|
Targets
-
-
Target
e56578ff67914010aa9f663876b66c4a
-
Size
37KB
-
MD5
e56578ff67914010aa9f663876b66c4a
-
SHA1
802b5d9f5be9fb8213b97567ebc1910e85ddd20f
-
SHA256
fc89c98b5be515bcbd365c74a9f4026d2d8dce04f9bc6255cc327b971c0bd407
-
SHA512
756b0fdfca550346207ddd292f6fa57d4db2e0207850dd9651edc341e716f80102ff6e8bdcf8fc000ce8535a1439c529b57d26313b58ad8613d99a978c17caf3
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-