General
-
Target
ec316f5ccd80c60ea9f5dd16d203a59e78f8dc2f43319a1f7f57766bcf7fc6b4
-
Size
27KB
-
Sample
220520-etsm7acber
-
MD5
a8027c6bf42393de8d926204b0a1a8dc
-
SHA1
b698cf703be7b6c2f5655c502ba8203657f00da8
-
SHA256
ec316f5ccd80c60ea9f5dd16d203a59e78f8dc2f43319a1f7f57766bcf7fc6b4
-
SHA512
40f4ec565f57cf12b19ce615543a610cceddc88110f5786fc483ebf1f7462da489a357316d8aefb9278c894bcc40330e99c8c79ad8f5e1537844f0ad1df14792
Behavioral task
behavioral1
Sample
FortPathes.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
FortPathes.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
someOne
85.253.176.179:1604
Java update
-
reg_key
Java update
-
splitter
|Hassan|
Targets
-
-
Target
FortPathes.exe
-
Size
205KB
-
MD5
aeee420ae93fe5b9bfce190db58e0df6
-
SHA1
339eb6b75763ae6239f62e0a15b4b0aff66f2ee1
-
SHA256
644afc95b56cb3bd71e927bc9770316a02695ed8dfb3ddac80f8e76a95e54c4b
-
SHA512
ee3b3c31d0b126f50cb0015c419e32b57ae5eaf1e8fd4cb218174a572ca5f5c085630593346a7e5adbc394e1be18078cf1732214696bec5669b73822ab44e0b3
Score10/10-
Executes dropped EXE
-
Drops startup file
-
Adds Run key to start application
-