General
-
Target
HEUR-Backdoor.MSIL.Crysan.gen-86973c6004a31a5.exe
-
Size
214KB
-
Sample
220914-k2rnradecp
-
MD5
8baf639f36c3392f5ba7ea12f2729652
-
SHA1
9a73a36a2fd9d9bb40f758ef26e0f8894edb7d41
-
SHA256
86973c6004a31a5ec071829bc13cc5582f1e0379af467f1362e381f0e8d0c2d9
-
SHA512
2a2b52c9066781685dac2986b7430470c17c02f8fb1d8067f4e99ebb24a24ea4f84ac06de33da1f3b1011880c9272af58ec0333f634cfe1af73d36079666cae0
-
SSDEEP
1536:XcNSuix4qLQF0Nfgz36NVzROkbhq/riJvbe+oLd3DdG4ze4H/5jit1u2j1/qPkCH:XcniY/riJS+o55Hxy1uHd
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Backdoor.MSIL.Crysan.gen-86973c6004a31a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HEUR-Backdoor.MSIL.Crysan.gen-86973c6004a31a5.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
topher
6.tcp.ngrok.io:10813
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
HEUR-Backdoor.MSIL.Crysan.gen-86973c6004a31a5.exe
-
Size
214KB
-
MD5
8baf639f36c3392f5ba7ea12f2729652
-
SHA1
9a73a36a2fd9d9bb40f758ef26e0f8894edb7d41
-
SHA256
86973c6004a31a5ec071829bc13cc5582f1e0379af467f1362e381f0e8d0c2d9
-
SHA512
2a2b52c9066781685dac2986b7430470c17c02f8fb1d8067f4e99ebb24a24ea4f84ac06de33da1f3b1011880c9272af58ec0333f634cfe1af73d36079666cae0
-
SSDEEP
1536:XcNSuix4qLQF0Nfgz36NVzROkbhq/riJvbe+oLd3DdG4ze4H/5jit1u2j1/qPkCH:XcniY/riJS+o55Hxy1uHd
Score10/10-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-