General
-
Target
5d6ab44634ffea26e78d0fd9e8d0c1c2.exe
-
Size
37KB
-
Sample
220930-x2m2safear
-
MD5
5d6ab44634ffea26e78d0fd9e8d0c1c2
-
SHA1
fd7b612bdb276f986aef915dd0b88ae0901d8eec
-
SHA256
198e657d4bb70f2f0a068ec656d91789d1cd3d503cf501be28828f42f3de9585
-
SHA512
aae72933b0b1ded5d9985bbda92c2e3ad608b25bd4b587bcc1f04a3fd6e29a5323c358b7b79d517c9fd7f7c85ae16f555c8981fcbffb865af921f1042041b4f8
-
SSDEEP
384:wyOMUiDHblmJEpRGyEfBffXNKCYyEAnrAF+rMRTyN/0L+EcoinblneHQM3epzXi:tOqHpR9EfBfVKClEOrM+rMRa8Nu8At
Behavioral task
behavioral1
Sample
5d6ab44634ffea26e78d0fd9e8d0c1c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d6ab44634ffea26e78d0fd9e8d0c1c2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
im523
HacKed
4.tcp.eu.ngrok.io:17872
6f09e9bd4d46a02277608d17d43fb05b
-
reg_key
6f09e9bd4d46a02277608d17d43fb05b
-
splitter
|'|'|
Targets
-
-
Target
5d6ab44634ffea26e78d0fd9e8d0c1c2.exe
-
Size
37KB
-
MD5
5d6ab44634ffea26e78d0fd9e8d0c1c2
-
SHA1
fd7b612bdb276f986aef915dd0b88ae0901d8eec
-
SHA256
198e657d4bb70f2f0a068ec656d91789d1cd3d503cf501be28828f42f3de9585
-
SHA512
aae72933b0b1ded5d9985bbda92c2e3ad608b25bd4b587bcc1f04a3fd6e29a5323c358b7b79d517c9fd7f7c85ae16f555c8981fcbffb865af921f1042041b4f8
-
SSDEEP
384:wyOMUiDHblmJEpRGyEfBffXNKCYyEAnrAF+rMRTyN/0L+EcoinblneHQM3epzXi:tOqHpR9EfBfVKClEOrM+rMRa8Nu8At
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-