General
-
Target
100087859969d960d0ed865af9f4707e1f0b162bce3692b8e1287c7396227569
-
Size
43KB
-
Sample
220520-fav5msdbfk
-
MD5
e4e468ce135a3392cbdfd179a82179fb
-
SHA1
c791bc56c94c12e1e4c52f8a6b526351c2cdb400
-
SHA256
100087859969d960d0ed865af9f4707e1f0b162bce3692b8e1287c7396227569
-
SHA512
7813ff51eb146be06e6df3c1d5839b11285c9b21afff2b80026a1e767623cb23330d49157a31d2152c50ae8d80c7b988987daa4d1b3d199e6fad786bfe558af2
Behavioral task
behavioral1
Sample
100087859969d960d0ed865af9f4707e1f0b162bce3692b8e1287c7396227569.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
100087859969d960d0ed865af9f4707e1f0b162bce3692b8e1287c7396227569.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
127.0.0.1:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
100087859969d960d0ed865af9f4707e1f0b162bce3692b8e1287c7396227569
-
Size
43KB
-
MD5
e4e468ce135a3392cbdfd179a82179fb
-
SHA1
c791bc56c94c12e1e4c52f8a6b526351c2cdb400
-
SHA256
100087859969d960d0ed865af9f4707e1f0b162bce3692b8e1287c7396227569
-
SHA512
7813ff51eb146be06e6df3c1d5839b11285c9b21afff2b80026a1e767623cb23330d49157a31d2152c50ae8d80c7b988987daa4d1b3d199e6fad786bfe558af2
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-