General
-
Target
086d0beffb9ac2f9e7c502496dfffacc.exe
-
Size
37KB
-
Sample
220407-leq95secc2
-
MD5
086d0beffb9ac2f9e7c502496dfffacc
-
SHA1
8ab427c8509c644b276db5edca504bd739eb135e
-
SHA256
266dc410718f70b5c26f84779f65f09d0d6d73cc8404285dd4e0d48a90959c5e
-
SHA512
be8ad234c1aab5619107bb27b8f6905629b435062e56189472f602d51363c16a65ca6be5bbc0282ccac6044be4e4c377eae393f1ff823d4d2bb3cbb11639c9b2
Behavioral task
behavioral1
Sample
086d0beffb9ac2f9e7c502496dfffacc.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
086d0beffb9ac2f9e7c502496dfffacc.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
njrat
im523
hack
6.tcp.ngrok.io:13420
2bafb35469254e19405da7b6b658f17c
-
reg_key
2bafb35469254e19405da7b6b658f17c
-
splitter
|'|'|
Targets
-
-
Target
086d0beffb9ac2f9e7c502496dfffacc.exe
-
Size
37KB
-
MD5
086d0beffb9ac2f9e7c502496dfffacc
-
SHA1
8ab427c8509c644b276db5edca504bd739eb135e
-
SHA256
266dc410718f70b5c26f84779f65f09d0d6d73cc8404285dd4e0d48a90959c5e
-
SHA512
be8ad234c1aab5619107bb27b8f6905629b435062e56189472f602d51363c16a65ca6be5bbc0282ccac6044be4e4c377eae393f1ff823d4d2bb3cbb11639c9b2
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-