General
-
Target
3fe6e95aaf5e6563084597ae6a03283dc6e8c2d6be2d73b0ffd148f20796baad
-
Size
8.7MB
-
Sample
220215-tm21lsgha2
-
MD5
e96b49168d8039c227de5c72bf41810b
-
SHA1
14944a4510d56864835eda74366dd93543de7e52
-
SHA256
3fe6e95aaf5e6563084597ae6a03283dc6e8c2d6be2d73b0ffd148f20796baad
-
SHA512
0c98e82b1e454d85edd505cdae47fbdcb19651bd9bc573722ecf69f6e10a606677d2d865b590a29a542e23cf554523392aeb8bd1c26bf3153368531a36d6a2c7
Static task
static1
Behavioral task
behavioral1
Sample
3fe6e95aaf5e6563084597ae6a03283dc6e8c2d6be2d73b0ffd148f20796baad.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3fe6e95aaf5e6563084597ae6a03283dc6e8c2d6be2d73b0ffd148f20796baad.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
njrat
0.7d
HACK GTA V
snowgato.duckdns.org:1177
1eb07ee8c21d622a801f6a0fb9cad455
-
reg_key
1eb07ee8c21d622a801f6a0fb9cad455
-
splitter
|'|'|
Targets
-
-
Target
3fe6e95aaf5e6563084597ae6a03283dc6e8c2d6be2d73b0ffd148f20796baad
-
Size
8.7MB
-
MD5
e96b49168d8039c227de5c72bf41810b
-
SHA1
14944a4510d56864835eda74366dd93543de7e52
-
SHA256
3fe6e95aaf5e6563084597ae6a03283dc6e8c2d6be2d73b0ffd148f20796baad
-
SHA512
0c98e82b1e454d85edd505cdae47fbdcb19651bd9bc573722ecf69f6e10a606677d2d865b590a29a542e23cf554523392aeb8bd1c26bf3153368531a36d6a2c7
Score10/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-