General
-
Target
bCP8.exe
-
Size
23KB
-
Sample
220713-ztvg1aager
-
MD5
6e449b0b98b38524647b74f93d180cd5
-
SHA1
04a51144421253ec992a1d407b3d006849f58e50
-
SHA256
36ec0ed30e8a776d4e7635b565859b28db6262c1772ca082ad1c2c211523547f
-
SHA512
90fcda2f004b021045d88b1cca860f50fb744c68e380cc9fce183a2c26410130454222b55e71867e27e9721bdc9877607e24e4f3e1b1eaa32d2a4dff168d9915
Behavioral task
behavioral1
Sample
bCP8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bCP8.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
0.7d
HacKed
5.tcp.ngrok.io:24566
be8f29d1887fe132d92d7abd370fbfc4
-
reg_key
be8f29d1887fe132d92d7abd370fbfc4
-
splitter
|'|'|
Targets
-
-
Target
bCP8.exe
-
Size
23KB
-
MD5
6e449b0b98b38524647b74f93d180cd5
-
SHA1
04a51144421253ec992a1d407b3d006849f58e50
-
SHA256
36ec0ed30e8a776d4e7635b565859b28db6262c1772ca082ad1c2c211523547f
-
SHA512
90fcda2f004b021045d88b1cca860f50fb744c68e380cc9fce183a2c26410130454222b55e71867e27e9721bdc9877607e24e4f3e1b1eaa32d2a4dff168d9915
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-