General
-
Target
c3009a51b416c6a22a6c044cbf0b7a9a9b863a7632da9a4e01efc08aec2bd37e
-
Size
546KB
-
Sample
220129-sjb5cadbc5
-
MD5
d297e0db6d63a952b08b6f0e3fe101e7
-
SHA1
52da80a4605dd658284a4a510861ed875bfb3dd4
-
SHA256
c3009a51b416c6a22a6c044cbf0b7a9a9b863a7632da9a4e01efc08aec2bd37e
-
SHA512
66224735ce06bb86a5d28e4c7d2afe0f06865a0e669ddfdbbac5bcf34e27c5955bede4562517b67cd63320b625b37928c6e5b8267c6dafd7bd37ce583fffc451
Static task
static1
Behavioral task
behavioral1
Sample
c3009a51b416c6a22a6c044cbf0b7a9a9b863a7632da9a4e01efc08aec2bd37e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c3009a51b416c6a22a6c044cbf0b7a9a9b863a7632da9a4e01efc08aec2bd37e.exe
Resource
win10-en-20211208
Malware Config
Extracted
njrat
0.7d
HacKed
fun4.dynu.com:448
cbc1d7b7c6f9fb9936651e38f1223080
-
reg_key
cbc1d7b7c6f9fb9936651e38f1223080
-
splitter
|'|'|
Targets
-
-
Target
c3009a51b416c6a22a6c044cbf0b7a9a9b863a7632da9a4e01efc08aec2bd37e
-
Size
546KB
-
MD5
d297e0db6d63a952b08b6f0e3fe101e7
-
SHA1
52da80a4605dd658284a4a510861ed875bfb3dd4
-
SHA256
c3009a51b416c6a22a6c044cbf0b7a9a9b863a7632da9a4e01efc08aec2bd37e
-
SHA512
66224735ce06bb86a5d28e4c7d2afe0f06865a0e669ddfdbbac5bcf34e27c5955bede4562517b67cd63320b625b37928c6e5b8267c6dafd7bd37ce583fffc451
Score10/10-
Registers COM server for autorun
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-