General
-
Target
28412b0f3a3010be0e140bcd1843ae8a.exe
-
Size
23KB
-
Sample
220729-ehpr6adha6
-
MD5
28412b0f3a3010be0e140bcd1843ae8a
-
SHA1
713ba709aa3639683f3b694e5f39cc70ae64bfc8
-
SHA256
141ebbc7f1ba7e845bffec372dd0fd6deb19827ab5f165b80800ba5d13db3599
-
SHA512
f8630601534848f3b2208773550d2575566441242b310ba314ad4403e4cdb43a6e6b5dc89ee02d896569a6a7221f7c71b6bd2ab5f931e8d3fc6d63cdfee78744
Behavioral task
behavioral1
Sample
28412b0f3a3010be0e140bcd1843ae8a.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
28412b0f3a3010be0e140bcd1843ae8a.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
njrat
0.7d
HacKed
138.199.47.194:8080
e175a5480e706552178dc58079e250f8
-
reg_key
e175a5480e706552178dc58079e250f8
-
splitter
|'|'|
Targets
-
-
Target
28412b0f3a3010be0e140bcd1843ae8a.exe
-
Size
23KB
-
MD5
28412b0f3a3010be0e140bcd1843ae8a
-
SHA1
713ba709aa3639683f3b694e5f39cc70ae64bfc8
-
SHA256
141ebbc7f1ba7e845bffec372dd0fd6deb19827ab5f165b80800ba5d13db3599
-
SHA512
f8630601534848f3b2208773550d2575566441242b310ba314ad4403e4cdb43a6e6b5dc89ee02d896569a6a7221f7c71b6bd2ab5f931e8d3fc6d63cdfee78744
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-