General
-
Target
ad34adbfdf41932a8891f1209113c9cc5d7465214af85d1d9861d9bd11ef1014
-
Size
43KB
-
Sample
220520-eyam6scdel
-
MD5
0347c6dabe49d64b141bc6aebe418ff1
-
SHA1
8d5f90740453bf5c37df549cfeebea3cf5fe3bc0
-
SHA256
ad34adbfdf41932a8891f1209113c9cc5d7465214af85d1d9861d9bd11ef1014
-
SHA512
725a07b4026712d1081bd8239d942f12cfe20b81c043496ba00af70275af4b38160dffd709bb35612d043afe2132afd220e918c4e3ba6c2bddde81cc58018a1c
Behavioral task
behavioral1
Sample
ad34adbfdf41932a8891f1209113c9cc5d7465214af85d1d9861d9bd11ef1014.exe
Resource
win7-20220414-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
Hacker
127.0.0.1:3566
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
ad34adbfdf41932a8891f1209113c9cc5d7465214af85d1d9861d9bd11ef1014
-
Size
43KB
-
MD5
0347c6dabe49d64b141bc6aebe418ff1
-
SHA1
8d5f90740453bf5c37df549cfeebea3cf5fe3bc0
-
SHA256
ad34adbfdf41932a8891f1209113c9cc5d7465214af85d1d9861d9bd11ef1014
-
SHA512
725a07b4026712d1081bd8239d942f12cfe20b81c043496ba00af70275af4b38160dffd709bb35612d043afe2132afd220e918c4e3ba6c2bddde81cc58018a1c
-
Executes dropped EXE
-
Drops startup file
-