General
-
Target
a5b3dd8d83d63498c52d938f63eb61bf.exe
-
Size
37KB
-
Sample
220527-ry5jrsfdbl
-
MD5
a5b3dd8d83d63498c52d938f63eb61bf
-
SHA1
6a07038608774231386f436ba4ca7063abf28078
-
SHA256
45bb2795caac14d2915644b8c6aed568a8681dd12cab779e5bb535cc03a95a34
-
SHA512
0e75a66c7366a6e0d5b05d45c453fab73c37e9376c2865ccc0741d7323d6568410e5a20e2d0c16801995028b0173edcb8ee58653b9874a3a351df6167666d745
Behavioral task
behavioral1
Sample
a5b3dd8d83d63498c52d938f63eb61bf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a5b3dd8d83d63498c52d938f63eb61bf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
im523
BOT
2.tcp.eu.ngrok.io:15441
88489d1083fd6ed1fecee39e01330c6c
-
reg_key
88489d1083fd6ed1fecee39e01330c6c
-
splitter
|'|'|
Targets
-
-
Target
a5b3dd8d83d63498c52d938f63eb61bf.exe
-
Size
37KB
-
MD5
a5b3dd8d83d63498c52d938f63eb61bf
-
SHA1
6a07038608774231386f436ba4ca7063abf28078
-
SHA256
45bb2795caac14d2915644b8c6aed568a8681dd12cab779e5bb535cc03a95a34
-
SHA512
0e75a66c7366a6e0d5b05d45c453fab73c37e9376c2865ccc0741d7323d6568410e5a20e2d0c16801995028b0173edcb8ee58653b9874a3a351df6167666d745
Score10/10-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-