General
-
Target
a86a64ee1ff4cc5480d383d7496a29208d59af9acb1835f1572f25bcd4e50198
-
Size
31KB
-
Sample
220520-z3pm4sddg2
-
MD5
16f2cf1676d0f3c0333c84076f4faf3e
-
SHA1
96f11640dd583e5b5121370ad6b133d214d7e6ec
-
SHA256
a86a64ee1ff4cc5480d383d7496a29208d59af9acb1835f1572f25bcd4e50198
-
SHA512
51167837d0b0ec1662fbc9b4f41c1e5fcee392442474305680a215997d8f8aaa77fb640e470203f60dce400cc8f440526bdc4745083642748038dae0d7800cf3
Behavioral task
behavioral1
Sample
a86a64ee1ff4cc5480d383d7496a29208d59af9acb1835f1572f25bcd4e50198.exe
Resource
win7-20220414-en
Malware Config
Extracted
njrat
0.7d
proverka
0.tcp.ngrok.io:12168
eb67deb6e8906041a3e951b1bc9895bf
-
reg_key
eb67deb6e8906041a3e951b1bc9895bf
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
a86a64ee1ff4cc5480d383d7496a29208d59af9acb1835f1572f25bcd4e50198
-
Size
31KB
-
MD5
16f2cf1676d0f3c0333c84076f4faf3e
-
SHA1
96f11640dd583e5b5121370ad6b133d214d7e6ec
-
SHA256
a86a64ee1ff4cc5480d383d7496a29208d59af9acb1835f1572f25bcd4e50198
-
SHA512
51167837d0b0ec1662fbc9b4f41c1e5fcee392442474305680a215997d8f8aaa77fb640e470203f60dce400cc8f440526bdc4745083642748038dae0d7800cf3
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Modifies Windows Firewall
-