General
-
Target
3a923993e88010cc912d2784a3793855f7c362fe5e06ccb067c3dfce4155bb56
-
Size
129KB
-
Sample
220625-dfwbgsbebk
-
MD5
e8c9a2905b86ab77e6a0db50ecff3c10
-
SHA1
ab3a02c180404722d399e671ed4b1973bc03c8ce
-
SHA256
3a923993e88010cc912d2784a3793855f7c362fe5e06ccb067c3dfce4155bb56
-
SHA512
d213916918dc973dde4df998e537bfa2f5c97e34eb5172e860f0dc12a6be2360357a8d134dbb843536362263a153e34e2f3173a997ad119c61d4359a190b8542
Static task
static1
Behavioral task
behavioral1
Sample
3a923993e88010cc912d2784a3793855f7c362fe5e06ccb067c3dfce4155bb56.exe
Resource
win7-20220414-en
Malware Config
Extracted
njrat
0.7d
HacKed
ramial.no-ip.biz:1257
e226bbcb766435e5c6575e6b41aa5e6d
-
reg_key
e226bbcb766435e5c6575e6b41aa5e6d
-
splitter
|'|'|
Targets
-
-
Target
3a923993e88010cc912d2784a3793855f7c362fe5e06ccb067c3dfce4155bb56
-
Size
129KB
-
MD5
e8c9a2905b86ab77e6a0db50ecff3c10
-
SHA1
ab3a02c180404722d399e671ed4b1973bc03c8ce
-
SHA256
3a923993e88010cc912d2784a3793855f7c362fe5e06ccb067c3dfce4155bb56
-
SHA512
d213916918dc973dde4df998e537bfa2f5c97e34eb5172e860f0dc12a6be2360357a8d134dbb843536362263a153e34e2f3173a997ad119c61d4359a190b8542
-
Detect Neshta Payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-