General
-
Target
D0A927970E230756281222C063F1A06B4637623794A26.exe
-
Size
10.5MB
-
Sample
220417-nc45bshbf9
-
MD5
9e63a0aa4f26539beeccb7180568fc4e
-
SHA1
649f49bfa20647858a8073a9416648b76773cfc5
-
SHA256
d0a927970e230756281222c063f1a06b4637623794a26843381e4de3df3c277f
-
SHA512
a3acd7ec1400ccc482239440450ef8df6719dd29ce6290b9f47764030a4e5b47ceb97ce74c71bb156409848e85ceaa38069d2d4113f4043883ae0a28053a546b
Static task
static1
Behavioral task
behavioral1
Sample
D0A927970E230756281222C063F1A06B4637623794A26.exe
Resource
win7-20220414-en
Malware Config
Extracted
njrat
0.7d
SoryMan
us-west-11608.packetriot.net:22794
9dc6936092ebce7762ab0f2981bc4ba4
-
reg_key
9dc6936092ebce7762ab0f2981bc4ba4
-
splitter
@!#&^%$
Targets
-
-
Target
D0A927970E230756281222C063F1A06B4637623794A26.exe
-
Size
10.5MB
-
MD5
9e63a0aa4f26539beeccb7180568fc4e
-
SHA1
649f49bfa20647858a8073a9416648b76773cfc5
-
SHA256
d0a927970e230756281222c063f1a06b4637623794a26843381e4de3df3c277f
-
SHA512
a3acd7ec1400ccc482239440450ef8df6719dd29ce6290b9f47764030a4e5b47ceb97ce74c71bb156409848e85ceaa38069d2d4113f4043883ae0a28053a546b
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-