General
-
Target
1836-55-0x00000000003C0000-0x00000000003D2000-memory.dmp
-
Size
72KB
-
Sample
220910-b3q9yahdf5
-
MD5
34c8585f3489be745e509e06b311c855
-
SHA1
abc0dad9b4265c09a879b8770a380c075d69931d
-
SHA256
8e4232565602a9a9e2c339a289508dfc54acab3b87ef736a54d0b5f4611bac4e
-
SHA512
479be6c055b1b00b4b4d7a4e3bcdf988b0f1816241fa2486cddc2a1c03a644c478b517a5f5c0d5bfba777cb1a86231a324fe742abe2a2a7a25c9581ce442b967
-
SSDEEP
384:TZyYL2adsbhKIyK55JoWgEmbr2z8Iij+ZsNO3PlpJKkkjh/TzF7pWnv1greT0pqH:dxNiwFKTJH2UuXQ/o61+L
Behavioral task
behavioral1
Sample
1836-55-0x00000000003C0000-0x00000000003D2000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1836-55-0x00000000003C0000-0x00000000003D2000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
7.tcp.eu.ngrok.io:13225
WindowsEnginee
-
reg_key
WindowsEnginee
-
splitter
|Hassan|
Targets
-
-
Target
1836-55-0x00000000003C0000-0x00000000003D2000-memory.dmp
-
Size
72KB
-
MD5
34c8585f3489be745e509e06b311c855
-
SHA1
abc0dad9b4265c09a879b8770a380c075d69931d
-
SHA256
8e4232565602a9a9e2c339a289508dfc54acab3b87ef736a54d0b5f4611bac4e
-
SHA512
479be6c055b1b00b4b4d7a4e3bcdf988b0f1816241fa2486cddc2a1c03a644c478b517a5f5c0d5bfba777cb1a86231a324fe742abe2a2a7a25c9581ce442b967
-
SSDEEP
384:TZyYL2adsbhKIyK55JoWgEmbr2z8Iij+ZsNO3PlpJKkkjh/TzF7pWnv1greT0pqH:dxNiwFKTJH2UuXQ/o61+L
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-