General
-
Target
efe2a3a655ce2f1bdf5aadc5f144c5deb8dc94c25e6ca6f1aa9385273fba1a29
-
Size
19.8MB
-
Sample
220724-zpz7pagad9
-
MD5
16b2534bf54c23436163ee3f1ddbff54
-
SHA1
4b6d06a98a22c0159f0e823d71db32b1efe8b24d
-
SHA256
efe2a3a655ce2f1bdf5aadc5f144c5deb8dc94c25e6ca6f1aa9385273fba1a29
-
SHA512
3c3b9c36b341983428b5a878ae6166b19e689c2908a356c433f378af4811139c96ebb610fb8c19eb03cb1cf83c3ef07d109ad4f3cc60fb75e2d9e14f4ab9d82b
Static task
static1
Behavioral task
behavioral1
Sample
efe2a3a655ce2f1bdf5aadc5f144c5deb8dc94c25e6ca6f1aa9385273fba1a29.exe
Resource
win7-20220718-en
Malware Config
Extracted
nanocore
1.2.2.0
24.6.141.96:1337
2b13cf2e-6b51-40a2-b312-fe2fed9718b6
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-05-07T06:44:15.790484036Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1337
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
2b13cf2e-6b51-40a2-b312-fe2fed9718b6
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
24.6.141.96
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
njrat
0.7d
HacKed
24.6.141.96:1337
267c3a6fd9e12bd4190b384b7f98d599
-
reg_key
267c3a6fd9e12bd4190b384b7f98d599
-
splitter
|'|'|
Targets
-
-
Target
efe2a3a655ce2f1bdf5aadc5f144c5deb8dc94c25e6ca6f1aa9385273fba1a29
-
Size
19.8MB
-
MD5
16b2534bf54c23436163ee3f1ddbff54
-
SHA1
4b6d06a98a22c0159f0e823d71db32b1efe8b24d
-
SHA256
efe2a3a655ce2f1bdf5aadc5f144c5deb8dc94c25e6ca6f1aa9385273fba1a29
-
SHA512
3c3b9c36b341983428b5a878ae6166b19e689c2908a356c433f378af4811139c96ebb610fb8c19eb03cb1cf83c3ef07d109ad4f3cc60fb75e2d9e14f4ab9d82b
-
Ratty Rat payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-