General
-
Target
dbfadddbe24ee459e7aac3c6937748b3d60e0f9547b77bdc1a582f2c7aba8838
-
Size
78KB
-
Sample
220121-26fkqacfhl
-
MD5
7ab3c97a8dcf771d4279407882118889
-
SHA1
c57f92cff68befeeb9286ec6d85ef8fc9ae728c7
-
SHA256
dbfadddbe24ee459e7aac3c6937748b3d60e0f9547b77bdc1a582f2c7aba8838
-
SHA512
0d94699da5bc986f56711cd3e90944bbb31b0084a66b931d2a1a00c334162a5411a70854c328045cbef55edafcd2f79b3c2ced1c39d45eeac176c773d0003744
Behavioral task
behavioral1
Sample
dbfadddbe24ee459e7aac3c6937748b3d60e0f9547b77bdc1a582f2c7aba8838.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dbfadddbe24ee459e7aac3c6937748b3d60e0f9547b77bdc1a582f2c7aba8838.exe
Resource
win10-en-20211208
Malware Config
Extracted
njrat
0.7.3
Pilonera
FESTIVALDEAMOR.PUBLICVM.COM:1407
Client.exe
-
reg_key
Client.exe
-
splitter
1234
Targets
-
-
Target
dbfadddbe24ee459e7aac3c6937748b3d60e0f9547b77bdc1a582f2c7aba8838
-
Size
78KB
-
MD5
7ab3c97a8dcf771d4279407882118889
-
SHA1
c57f92cff68befeeb9286ec6d85ef8fc9ae728c7
-
SHA256
dbfadddbe24ee459e7aac3c6937748b3d60e0f9547b77bdc1a582f2c7aba8838
-
SHA512
0d94699da5bc986f56711cd3e90944bbb31b0084a66b931d2a1a00c334162a5411a70854c328045cbef55edafcd2f79b3c2ced1c39d45eeac176c773d0003744
Score6/10-
Adds Run key to start application
-