General
-
Target
5114eefd8d1720dde3195d2ce145ee6d14bf74eae6cb1902d3049dd2b591ee5a
-
Size
31KB
-
Sample
220520-1dqpjsdge2
-
MD5
20d1dd5fffbe00e92ecd03ef84d4c453
-
SHA1
78191645fbe8381a65efec83e1d96e14ef9bd8cc
-
SHA256
5114eefd8d1720dde3195d2ce145ee6d14bf74eae6cb1902d3049dd2b591ee5a
-
SHA512
1ae4ea038d26b63984e17a692f552410820c9d3fe8b1b51b89619e49269833dbe3e517299a044206c6e38692140ff933ea5eca34cf28a07c7bb0674d7084c9a7
Behavioral task
behavioral1
Sample
5114eefd8d1720dde3195d2ce145ee6d14bf74eae6cb1902d3049dd2b591ee5a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5114eefd8d1720dde3195d2ce145ee6d14bf74eae6cb1902d3049dd2b591ee5a.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
0.7d
q
192.168.1.3:7777
e1be8d1e486c97d8267b021626edf85d
-
reg_key
e1be8d1e486c97d8267b021626edf85d
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
5114eefd8d1720dde3195d2ce145ee6d14bf74eae6cb1902d3049dd2b591ee5a
-
Size
31KB
-
MD5
20d1dd5fffbe00e92ecd03ef84d4c453
-
SHA1
78191645fbe8381a65efec83e1d96e14ef9bd8cc
-
SHA256
5114eefd8d1720dde3195d2ce145ee6d14bf74eae6cb1902d3049dd2b591ee5a
-
SHA512
1ae4ea038d26b63984e17a692f552410820c9d3fe8b1b51b89619e49269833dbe3e517299a044206c6e38692140ff933ea5eca34cf28a07c7bb0674d7084c9a7
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-