General
-
Target
4b0f762e2935bd48524d835f4d6eb6289f20721241a362fb51a520150fdba95e
-
Size
37KB
-
Sample
220520-w4zmxsfaak
-
MD5
85972855ff977c521b1a717a32593fdd
-
SHA1
b0144dfb8130083922e35b70152edd83739359a9
-
SHA256
4b0f762e2935bd48524d835f4d6eb6289f20721241a362fb51a520150fdba95e
-
SHA512
1c81a09c3e562bbe462690d899499d187e3b52fd5d5ec759482d7dda5136c4af54f5c806d246db8a331effb633f96754987a8af03238b7cda5019c5fd17c849f
Behavioral task
behavioral1
Sample
4b0f762e2935bd48524d835f4d6eb6289f20721241a362fb51a520150fdba95e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4b0f762e2935bd48524d835f4d6eb6289f20721241a362fb51a520150fdba95e.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
im523
HacKer
91.232.111.212:7777
47f152bbb0d9981b492589085b7b7e18
-
reg_key
47f152bbb0d9981b492589085b7b7e18
-
splitter
|'|'|
Targets
-
-
Target
4b0f762e2935bd48524d835f4d6eb6289f20721241a362fb51a520150fdba95e
-
Size
37KB
-
MD5
85972855ff977c521b1a717a32593fdd
-
SHA1
b0144dfb8130083922e35b70152edd83739359a9
-
SHA256
4b0f762e2935bd48524d835f4d6eb6289f20721241a362fb51a520150fdba95e
-
SHA512
1c81a09c3e562bbe462690d899499d187e3b52fd5d5ec759482d7dda5136c4af54f5c806d246db8a331effb633f96754987a8af03238b7cda5019c5fd17c849f
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-