General
-
Target
0a50824b678348bd67a156dc7f047aeb.exe
-
Size
185KB
-
Sample
220812-feq2gsggem
-
MD5
0a50824b678348bd67a156dc7f047aeb
-
SHA1
a06073acc501dfc4e8e597d89fb2b325bbb1a596
-
SHA256
8cfd2bbf0004dbef8d7563a2cc96c39a02406639c62162aa93c4aeb90ace83d5
-
SHA512
ae6a41e12e0910078b85724bca2aee1d26072095cba209606c5ee928c8498469487414a4e4cb7f8bbc59bb5e2e5734ec075f30a91ba3b8f14bf8320645437ca9
Behavioral task
behavioral1
Sample
0a50824b678348bd67a156dc7f047aeb.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
0a50824b678348bd67a156dc7f047aeb.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
njrat
im523
HacKed
4.tcp.eu.ngrok.io:11216
f82e3c110cf66bedecc983fda452cc9e
-
reg_key
f82e3c110cf66bedecc983fda452cc9e
-
splitter
|'|'|
Targets
-
-
Target
0a50824b678348bd67a156dc7f047aeb.exe
-
Size
185KB
-
MD5
0a50824b678348bd67a156dc7f047aeb
-
SHA1
a06073acc501dfc4e8e597d89fb2b325bbb1a596
-
SHA256
8cfd2bbf0004dbef8d7563a2cc96c39a02406639c62162aa93c4aeb90ace83d5
-
SHA512
ae6a41e12e0910078b85724bca2aee1d26072095cba209606c5ee928c8498469487414a4e4cb7f8bbc59bb5e2e5734ec075f30a91ba3b8f14bf8320645437ca9
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-