General
-
Target
93667713af8e23ecde25e78d05f762ecd77d8a7b8667ec78a3cafbf43d724c4f
-
Size
666KB
-
Sample
220323-lfhz6abfe8
-
MD5
92493532531788040b78f62f00c1d5d6
-
SHA1
e9a348440a7c42b4b9416830dba158f2c51fa68f
-
SHA256
93667713af8e23ecde25e78d05f762ecd77d8a7b8667ec78a3cafbf43d724c4f
-
SHA512
b0b6e704ff091318de64a05ce66a029831cb091d95257b184486b5369d22369cc1121a6eff304abce254ad760ba29dbc7cfcb2cd12261a50050e7728415ff818
Static task
static1
Behavioral task
behavioral1
Sample
93667713af8e23ecde25e78d05f762ecd77d8a7b8667ec78a3cafbf43d724c4f.exe
Resource
win7-20220311-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/947445080342556692/k5eX_haEP42zYxqA0vzh33TmF53CrHI3NFO_LEsqnIXkOW8GqH66QMKAvOSZ3Fkkfhjh
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
127.0.0.1:25565
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
93667713af8e23ecde25e78d05f762ecd77d8a7b8667ec78a3cafbf43d724c4f
-
Size
666KB
-
MD5
92493532531788040b78f62f00c1d5d6
-
SHA1
e9a348440a7c42b4b9416830dba158f2c51fa68f
-
SHA256
93667713af8e23ecde25e78d05f762ecd77d8a7b8667ec78a3cafbf43d724c4f
-
SHA512
b0b6e704ff091318de64a05ce66a029831cb091d95257b184486b5369d22369cc1121a6eff304abce254ad760ba29dbc7cfcb2cd12261a50050e7728415ff818
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-