General
-
Target
e670623a56793001dc66b95d934767e93e49035875b7cca07548ba65c3074948
-
Size
32KB
-
Sample
220515-z7aprafgd9
-
MD5
00174f6351a98a7b225b9f745f6e67de
-
SHA1
0b8741728df6e8405a0920b0eb772dd78e91f54d
-
SHA256
e670623a56793001dc66b95d934767e93e49035875b7cca07548ba65c3074948
-
SHA512
937455daec1599be71f25ff059e10d310e880987bd91bdd470377c729ba01605029137da613590f91b96522091d64f2c8c8a1142f39822fb8512ec04ad17f772
Static task
static1
Behavioral task
behavioral1
Sample
e670623a56793001dc66b95d934767e93e49035875b7cca07548ba65c3074948.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e670623a56793001dc66b95d934767e93e49035875b7cca07548ba65c3074948.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
Hacked By HiDDen PerSOn
fc9ace1e5dd7c0bf960c112ea2e25185
-
reg_key
fc9ace1e5dd7c0bf960c112ea2e25185
Targets
-
-
Target
e670623a56793001dc66b95d934767e93e49035875b7cca07548ba65c3074948
-
Size
32KB
-
MD5
00174f6351a98a7b225b9f745f6e67de
-
SHA1
0b8741728df6e8405a0920b0eb772dd78e91f54d
-
SHA256
e670623a56793001dc66b95d934767e93e49035875b7cca07548ba65c3074948
-
SHA512
937455daec1599be71f25ff059e10d310e880987bd91bdd470377c729ba01605029137da613590f91b96522091d64f2c8c8a1142f39822fb8512ec04ad17f772
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-