General
-
Target
a56b590f350305bacd33b60e5c866c5ad9fb6a318ea8d9afe5149c1a49171d6d
-
Size
93KB
-
Sample
220508-wltnysecd4
-
MD5
acc1465e2be291e70935abc7cf4bd21c
-
SHA1
f9ddf1b9d275e9b17fed8057eedddda15fef4a4a
-
SHA256
a56b590f350305bacd33b60e5c866c5ad9fb6a318ea8d9afe5149c1a49171d6d
-
SHA512
9173864524173d00839dd518766136537ec82ae2637b6c2fe16788eaba72068fe08dfcbb4e15d9de0c6aa8f2bb1aa025ba2902fe8e7acb8eaad5bed39429f213
Behavioral task
behavioral1
Sample
a56b590f350305bacd33b60e5c866c5ad9fb6a318ea8d9afe5149c1a49171d6d.exe
Resource
win7-20220414-en
Malware Config
Extracted
njrat
0.7d
HacKer
FRANSESCOjUuFRANSESCOjkuFRANSESCOTFRANSESCOyLjEwNAStrikStrik:MTYwNA==
43eaed72e15ff576accb4dc56c41f93d
-
reg_key
43eaed72e15ff576accb4dc56c41f93d
-
splitter
|'|'|
Targets
-
-
Target
a56b590f350305bacd33b60e5c866c5ad9fb6a318ea8d9afe5149c1a49171d6d
-
Size
93KB
-
MD5
acc1465e2be291e70935abc7cf4bd21c
-
SHA1
f9ddf1b9d275e9b17fed8057eedddda15fef4a4a
-
SHA256
a56b590f350305bacd33b60e5c866c5ad9fb6a318ea8d9afe5149c1a49171d6d
-
SHA512
9173864524173d00839dd518766136537ec82ae2637b6c2fe16788eaba72068fe08dfcbb4e15d9de0c6aa8f2bb1aa025ba2902fe8e7acb8eaad5bed39429f213
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-