General
-
Target
1b32ce4cb4efc534e6716d1d52d7673c.exe
-
Size
52KB
-
Sample
220630-zlz3hsbbaq
-
MD5
1b32ce4cb4efc534e6716d1d52d7673c
-
SHA1
aaf37379f8a17661b197f0e2314ba7e29fcec069
-
SHA256
046f0fdb5d6d0489e8a81c239f311c2a26e2ca18f5b58c4f4655e7ab1862e026
-
SHA512
ccf0262da4e9242225ff943a3e145b65068589df863a89fa97581abeac04355e102187843f2d596b0f324ed795862000e9b6af841b194e7fd4ed72cfe164bf6b
Behavioral task
behavioral1
Sample
1b32ce4cb4efc534e6716d1d52d7673c.exe
Resource
win7-20220414-en
Malware Config
Extracted
njrat
im523
Kirieshka
4.tcp.eu.ngrok.io:17963
7a59d0933f6f469cabe3a8b0b803e909
-
reg_key
7a59d0933f6f469cabe3a8b0b803e909
-
splitter
|'|'|
Targets
-
-
Target
1b32ce4cb4efc534e6716d1d52d7673c.exe
-
Size
52KB
-
MD5
1b32ce4cb4efc534e6716d1d52d7673c
-
SHA1
aaf37379f8a17661b197f0e2314ba7e29fcec069
-
SHA256
046f0fdb5d6d0489e8a81c239f311c2a26e2ca18f5b58c4f4655e7ab1862e026
-
SHA512
ccf0262da4e9242225ff943a3e145b65068589df863a89fa97581abeac04355e102187843f2d596b0f324ed795862000e9b6af841b194e7fd4ed72cfe164bf6b
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-