General
-
Target
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4
-
Size
216KB
-
Sample
220121-3lch1adbd4
-
MD5
90b1135d0678e51273bdd36523b59f98
-
SHA1
827ec99df4e10e99e4095a8ddbb95398a90ae728
-
SHA256
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4
-
SHA512
b8b26661053a81eaf9f86109d947ef07f30bbf77113e67bc7e2397dfafeeebd37b279801b0c3edc759dedb68659ec494f963824423a85809c0a4c7aa81167727
Static task
static1
Behavioral task
behavioral1
Sample
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4.exe
Resource
win10-en-20211208
Malware Config
Extracted
njrat
0.7.3
FIFA 2020
federa.duckdns.org:1990
Client.exe
-
reg_key
Client.exe
-
splitter
1990
Targets
-
-
Target
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4
-
Size
216KB
-
MD5
90b1135d0678e51273bdd36523b59f98
-
SHA1
827ec99df4e10e99e4095a8ddbb95398a90ae728
-
SHA256
5aeabf6af7ec72e14269699ca9c32c42b278b620c523efacd06316b09764acb4
-
SHA512
b8b26661053a81eaf9f86109d947ef07f30bbf77113e67bc7e2397dfafeeebd37b279801b0c3edc759dedb68659ec494f963824423a85809c0a4c7aa81167727
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-