General
-
Target
20_89_27.EXE
-
Size
9.4MB
-
Sample
220924-tfpfyabeh2
-
MD5
0894f84db87ca8148cd35781341489a2
-
SHA1
de5b88287a6454115d06de0d555e94820c3791c8
-
SHA256
c06cab989e964346467e4190f382ebc1777ef20786ac7f190ae080b8422f2d88
-
SHA512
00579a26b5640deae733df142f3e86a4b62c9a52828256d7ce165ad8ac7ffb2233a8e1f9a96268e3391e0ebcabb136e62633660881b8dbafc410b7531731566c
-
SSDEEP
49152:aJJKPuu28T4Vlp50dmHwWrwIdECy8AmY+VG9hk:1uu2r950873yr
Static task
static1
Behavioral task
behavioral1
Sample
20_89_27.exe
Resource
win7-20220812-en
Malware Config
Extracted
bitrat
1.38
bit9090.duckdns.org:9090
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Extracted
njrat
v2.0
May4000
dan4000.duckdns.org:4000
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
20_89_27.EXE
-
Size
9.4MB
-
MD5
0894f84db87ca8148cd35781341489a2
-
SHA1
de5b88287a6454115d06de0d555e94820c3791c8
-
SHA256
c06cab989e964346467e4190f382ebc1777ef20786ac7f190ae080b8422f2d88
-
SHA512
00579a26b5640deae733df142f3e86a4b62c9a52828256d7ce165ad8ac7ffb2233a8e1f9a96268e3391e0ebcabb136e62633660881b8dbafc410b7531731566c
-
SSDEEP
49152:aJJKPuu28T4Vlp50dmHwWrwIdECy8AmY+VG9hk:1uu2r950873yr
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-