General
-
Target
RedEnginex86support.bin
-
Size
425KB
-
Sample
220718-w8w3ladbb3
-
MD5
80e2b33deef5eda9d1871e69937ee19d
-
SHA1
ac5a893026a6d799f55fbf43e97b8ca8b6c3be35
-
SHA256
218a1f501d61b425bf6dd32b89df2c39431ad5139be81ce50c4f0d5cb95e914a
-
SHA512
48bf684c0195cb183172fa0a983f56d12671f7e697837dc703b342dac843ee0595196b9361a982c8bcdb48d2c9718c4e59fc510f700ad2d74fbe14ff2608d1c9
Behavioral task
behavioral1
Sample
RedEnginex86support.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
RedEnginex86support.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
v2.0
HacKed
anythingeverlol.ddns.net:5555
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
RedEnginex86support.bin
-
Size
425KB
-
MD5
80e2b33deef5eda9d1871e69937ee19d
-
SHA1
ac5a893026a6d799f55fbf43e97b8ca8b6c3be35
-
SHA256
218a1f501d61b425bf6dd32b89df2c39431ad5139be81ce50c4f0d5cb95e914a
-
SHA512
48bf684c0195cb183172fa0a983f56d12671f7e697837dc703b342dac843ee0595196b9361a982c8bcdb48d2c9718c4e59fc510f700ad2d74fbe14ff2608d1c9
-
Detect Neshta payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-