General
-
Target
0335549dd5d1118a7f7d5f27cb3580df.exe
-
Size
23KB
-
Sample
220720-ng72safcfl
-
MD5
0335549dd5d1118a7f7d5f27cb3580df
-
SHA1
e7e04abff7b927035413384fec50f96fd5c4bf13
-
SHA256
d261f3a5a6b1dbedde2e566d010b71ce3bdb9162942945f8f701b6a3dffbc136
-
SHA512
a62cac6e2eb2d6e2f5b88c92bd0692cd12b49f604ccdca885a557426ff1fde13112c6fd5997421d0023063918f42f8d6e760af3085bc7dc5fa7734bef61348ca
Behavioral task
behavioral1
Sample
0335549dd5d1118a7f7d5f27cb3580df.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
0335549dd5d1118a7f7d5f27cb3580df.exe
Resource
win10v2004-20220718-en
Malware Config
Extracted
njrat
0.7d
HacKed
spk.accesscam.org:55554
8b74397fe4c6a2e2f2b0ca227328ea9d
-
reg_key
8b74397fe4c6a2e2f2b0ca227328ea9d
-
splitter
|'|'|
Targets
-
-
Target
0335549dd5d1118a7f7d5f27cb3580df.exe
-
Size
23KB
-
MD5
0335549dd5d1118a7f7d5f27cb3580df
-
SHA1
e7e04abff7b927035413384fec50f96fd5c4bf13
-
SHA256
d261f3a5a6b1dbedde2e566d010b71ce3bdb9162942945f8f701b6a3dffbc136
-
SHA512
a62cac6e2eb2d6e2f5b88c92bd0692cd12b49f604ccdca885a557426ff1fde13112c6fd5997421d0023063918f42f8d6e760af3085bc7dc5fa7734bef61348ca
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-