General
-
Target
4e164a36f967b7eb35889c956ce745dcdc057c10399fe76140449fe38abafe38
-
Size
328KB
-
Sample
220308-w3p24aadb6
-
MD5
e0d0ff8d8fe7f1f62368d24e9f3f49cd
-
SHA1
7a65c94b58fb5cbfdd9b377beb9f4e965646963a
-
SHA256
4e164a36f967b7eb35889c956ce745dcdc057c10399fe76140449fe38abafe38
-
SHA512
7f9d94909bd8cfd1f98d87c70514719c9c35e49e7f8d6a55e1c7427bf50908e34496201d0402966b5bd0660ef78382b9f24e1528fe0c353804bc4d085aee7646
Static task
static1
Behavioral task
behavioral1
Sample
4e164a36f967b7eb35889c956ce745dcdc057c10399fe76140449fe38abafe38.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
4e164a36f967b7eb35889c956ce745dcdc057c10399fe76140449fe38abafe38.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
v1
xyz.videomarket.eu:1970
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
4e164a36f967b7eb35889c956ce745dcdc057c10399fe76140449fe38abafe38
-
Size
328KB
-
MD5
e0d0ff8d8fe7f1f62368d24e9f3f49cd
-
SHA1
7a65c94b58fb5cbfdd9b377beb9f4e965646963a
-
SHA256
4e164a36f967b7eb35889c956ce745dcdc057c10399fe76140449fe38abafe38
-
SHA512
7f9d94909bd8cfd1f98d87c70514719c9c35e49e7f8d6a55e1c7427bf50908e34496201d0402966b5bd0660ef78382b9f24e1528fe0c353804bc4d085aee7646
Score10/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-