General
-
Target
Server.exe
-
Size
37KB
-
Sample
220708-ldke7sdcg3
-
MD5
4727f86c568eb14991b807c1568c273c
-
SHA1
bba0834114c4a84a12248e73c7be9eb2c3af1aa8
-
SHA256
ee9dc0e8f00622a3b8822299bc96b38596338baf103ff51e6d90f08c858f01f5
-
SHA512
2ae243cec177ae907c1f8131d2f86606855fb6b10f281ddf3d948a80ab81f47f4b9a470a25bc90f40d132c543524f6d267909d3df4665495b03efb957bd65d40
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20220414-en
Malware Config
Extracted
njrat
im523
Лошок
194.71.126.120:17954
13d65a76848c880b980676c6c1cc6341
-
reg_key
13d65a76848c880b980676c6c1cc6341
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
37KB
-
MD5
4727f86c568eb14991b807c1568c273c
-
SHA1
bba0834114c4a84a12248e73c7be9eb2c3af1aa8
-
SHA256
ee9dc0e8f00622a3b8822299bc96b38596338baf103ff51e6d90f08c858f01f5
-
SHA512
2ae243cec177ae907c1f8131d2f86606855fb6b10f281ddf3d948a80ab81f47f4b9a470a25bc90f40d132c543524f6d267909d3df4665495b03efb957bd65d40
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-