General
-
Target
5a8c05db738e43447bc36122d5e83a8c2b1cfd34b6c8036bfa946b95bf16cc83
-
Size
23KB
-
Sample
220520-rr9j5sbcbj
-
MD5
dafc19b65a1d5c42989e2258f51cbe44
-
SHA1
d87e886de1bd237ece73a000ed8e2891b0e7d241
-
SHA256
5a8c05db738e43447bc36122d5e83a8c2b1cfd34b6c8036bfa946b95bf16cc83
-
SHA512
605e24bba49573d01a85e53d406f97540bf10312bf221c896d10e78eb1b237f19c7e46ed04ab8540a6f27aedbe5e48d3724c72503cb3ec8fe85c7834e62aa4ca
Behavioral task
behavioral1
Sample
5a8c05db738e43447bc36122d5e83a8c2b1cfd34b6c8036bfa946b95bf16cc83.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5a8c05db738e43447bc36122d5e83a8c2b1cfd34b6c8036bfa946b95bf16cc83.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:8808
f974c04cda44f6d8679500cc9da12bdb
-
reg_key
f974c04cda44f6d8679500cc9da12bdb
-
splitter
|'|'|
Targets
-
-
Target
5a8c05db738e43447bc36122d5e83a8c2b1cfd34b6c8036bfa946b95bf16cc83
-
Size
23KB
-
MD5
dafc19b65a1d5c42989e2258f51cbe44
-
SHA1
d87e886de1bd237ece73a000ed8e2891b0e7d241
-
SHA256
5a8c05db738e43447bc36122d5e83a8c2b1cfd34b6c8036bfa946b95bf16cc83
-
SHA512
605e24bba49573d01a85e53d406f97540bf10312bf221c896d10e78eb1b237f19c7e46ed04ab8540a6f27aedbe5e48d3724c72503cb3ec8fe85c7834e62aa4ca
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-