General
-
Target
7075a0ad7d167b990717f95a36a1292243e649aa628d25381a3aef47a72dafd7
-
Size
23KB
-
Sample
220520-faq6padbem
-
MD5
77cffe535a99ba32ba939db431d5fa10
-
SHA1
db59fefb9de005accdf660728e47d3577cf43a90
-
SHA256
7075a0ad7d167b990717f95a36a1292243e649aa628d25381a3aef47a72dafd7
-
SHA512
fa31d8f28fbb574c954507d661fa56846d5aaa258e759098d368705d044acb9e7e1c8f4f51dc90c44dc37c1e9e46c296e5ef714b9c233b443a05a7bad4e015c4
Behavioral task
behavioral1
Sample
7075a0ad7d167b990717f95a36a1292243e649aa628d25381a3aef47a72dafd7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7075a0ad7d167b990717f95a36a1292243e649aa628d25381a3aef47a72dafd7.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:8808
da73141765181666c75fcf6c94008eee
-
reg_key
da73141765181666c75fcf6c94008eee
-
splitter
|'|'|
Targets
-
-
Target
7075a0ad7d167b990717f95a36a1292243e649aa628d25381a3aef47a72dafd7
-
Size
23KB
-
MD5
77cffe535a99ba32ba939db431d5fa10
-
SHA1
db59fefb9de005accdf660728e47d3577cf43a90
-
SHA256
7075a0ad7d167b990717f95a36a1292243e649aa628d25381a3aef47a72dafd7
-
SHA512
fa31d8f28fbb574c954507d661fa56846d5aaa258e759098d368705d044acb9e7e1c8f4f51dc90c44dc37c1e9e46c296e5ef714b9c233b443a05a7bad4e015c4
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-