General
-
Target
HEUR-Trojan.Win32.Generic-a66b1473c334a14386db0e41b0c3eaf394370c9a38491f065ad46205a3805efc.exe
-
Size
663KB
-
Sample
220922-v92h2afhbl
-
MD5
e4df57bd77bee2f9c9e3ea85d9140cc7
-
SHA1
a382fdddc8b9c47d57878c8e3a24bd991400a76b
-
SHA256
a66b1473c334a14386db0e41b0c3eaf394370c9a38491f065ad46205a3805efc
-
SHA512
81c8414cb0abef54c40a62ba9fca850d3d1bd6a71296979a36e9db4a340b42cf1d9225997317db9e1b56a9f51f82f18d109a6b73171ab1306d7120a97e7cde26
-
SSDEEP
12288:huk4uHbAxQCDsAePggw38ZFjejph6YKg4Mk0V/hDix9WE3QqH3csD4z:hJt7AGMExw38ZFjejph6YKg4MLC33csW
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.Generic-a66b1473c334a14386db0e41b0c3eaf394370c9a38491f065ad46205a3805efc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
HEUR-Trojan.Win32.Generic-a66b1473c334a14386db0e41b0c3eaf394370c9a38491f065ad46205a3805efc.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
198.54.133.72:59249
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
HEUR-Trojan.Win32.Generic-a66b1473c334a14386db0e41b0c3eaf394370c9a38491f065ad46205a3805efc.exe
-
Size
663KB
-
MD5
e4df57bd77bee2f9c9e3ea85d9140cc7
-
SHA1
a382fdddc8b9c47d57878c8e3a24bd991400a76b
-
SHA256
a66b1473c334a14386db0e41b0c3eaf394370c9a38491f065ad46205a3805efc
-
SHA512
81c8414cb0abef54c40a62ba9fca850d3d1bd6a71296979a36e9db4a340b42cf1d9225997317db9e1b56a9f51f82f18d109a6b73171ab1306d7120a97e7cde26
-
SSDEEP
12288:huk4uHbAxQCDsAePggw38ZFjejph6YKg4Mk0V/hDix9WE3QqH3csD4z:hJt7AGMExw38ZFjejph6YKg4MLC33csW
-
Modifies security service
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-