General
-
Target
df949161b20c6917699483f28fba2b545ab30ea5456275a3cce6cd19e921fd10
-
Size
29KB
-
Sample
220701-ft1jgafbd4
-
MD5
977dbc36f17b3a6f4a0f4efb01391dd2
-
SHA1
e6a49e5405d3e94825920b84ace9bcb4b7c53731
-
SHA256
df949161b20c6917699483f28fba2b545ab30ea5456275a3cce6cd19e921fd10
-
SHA512
6e94acc93b633585207ed90a9d91256712cc677b67c85ad5bbbd6aa55b3832d246553f39022d50bdad024f95bce1b79bba3c4eb84111df2ef5103e4e760a1549
Behavioral task
behavioral1
Sample
df949161b20c6917699483f28fba2b545ab30ea5456275a3cce6cd19e921fd10.exe
Resource
win7-20220414-en
Malware Config
Extracted
njrat
0.6.4
HacKed
yekihackers.ddns.net:2020
ba4c12bee3027d94da5c81db2d196bfd
-
reg_key
ba4c12bee3027d94da5c81db2d196bfd
-
splitter
|'|'|
Targets
-
-
Target
df949161b20c6917699483f28fba2b545ab30ea5456275a3cce6cd19e921fd10
-
Size
29KB
-
MD5
977dbc36f17b3a6f4a0f4efb01391dd2
-
SHA1
e6a49e5405d3e94825920b84ace9bcb4b7c53731
-
SHA256
df949161b20c6917699483f28fba2b545ab30ea5456275a3cce6cd19e921fd10
-
SHA512
6e94acc93b633585207ed90a9d91256712cc677b67c85ad5bbbd6aa55b3832d246553f39022d50bdad024f95bce1b79bba3c4eb84111df2ef5103e4e760a1549
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-