General
-
Target
60e6bb34322ecf9b9db3b4079e08191d9b79d079bd78548bcd7d04aea639f030
-
Size
23KB
-
Sample
220730-2s34vsbga3
-
MD5
b689fb71432554182bb97c56a696a2c7
-
SHA1
a87ebc1f17508f35439d019163efd89f4ec16464
-
SHA256
60e6bb34322ecf9b9db3b4079e08191d9b79d079bd78548bcd7d04aea639f030
-
SHA512
f67b55bc4214849a23be04cdfa8cfef4bf30e3ed0d6d36de7961ef61977815861cf949346d279aa07babec0a256ab503e6b05fd490bb7af51c0e04bffb08c701
Behavioral task
behavioral1
Sample
60e6bb34322ecf9b9db3b4079e08191d9b79d079bd78548bcd7d04aea639f030.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
60e6bb34322ecf9b9db3b4079e08191d9b79d079bd78548bcd7d04aea639f030.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
njrat
0.7d
HacKed
wlkjdaui828.ddns.net:1177
2699e520cbd4295cbb0dda2cd9d08c81
-
reg_key
2699e520cbd4295cbb0dda2cd9d08c81
-
splitter
|'|'|
Targets
-
-
Target
60e6bb34322ecf9b9db3b4079e08191d9b79d079bd78548bcd7d04aea639f030
-
Size
23KB
-
MD5
b689fb71432554182bb97c56a696a2c7
-
SHA1
a87ebc1f17508f35439d019163efd89f4ec16464
-
SHA256
60e6bb34322ecf9b9db3b4079e08191d9b79d079bd78548bcd7d04aea639f030
-
SHA512
f67b55bc4214849a23be04cdfa8cfef4bf30e3ed0d6d36de7961ef61977815861cf949346d279aa07babec0a256ab503e6b05fd490bb7af51c0e04bffb08c701
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-