General
-
Target
Avatar 2 (2022).exe
-
Size
37KB
-
Sample
220711-rdlk6ahfgk
-
MD5
4291ac32cc90795fee4a449b4ce933de
-
SHA1
a598f8f511977041fb7d0454495100bd122a1d80
-
SHA256
9262834e981a283001ee85c5d4c638bdefccb48650cc73e6cdb42dcd7d03debf
-
SHA512
bc6fabebf55b25d0a0857752586c3cb573ee6ac91773759613c3e6174f3439f25be462604b6c8adc7bfc72a40d85659843ce87b5ef55f05b60222ee2bada0eb4
Malware Config
Extracted
njrat
im523
Лошок
194.71.126.120:17954
13d65a76848c880b980676c6c1cc6341
-
reg_key
13d65a76848c880b980676c6c1cc6341
-
splitter
|'|'|
Targets
-
-
Target
Avatar 2 (2022).exe
-
Size
37KB
-
MD5
4291ac32cc90795fee4a449b4ce933de
-
SHA1
a598f8f511977041fb7d0454495100bd122a1d80
-
SHA256
9262834e981a283001ee85c5d4c638bdefccb48650cc73e6cdb42dcd7d03debf
-
SHA512
bc6fabebf55b25d0a0857752586c3cb573ee6ac91773759613c3e6174f3439f25be462604b6c8adc7bfc72a40d85659843ce87b5ef55f05b60222ee2bada0eb4
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)
suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-