General
-
Target
621dd2ea2c86536491ab62540a990d9c575d4ac11b00319106d86471844d6590
-
Size
23KB
-
Sample
221002-2n5rwsdhc7
-
MD5
6b1b40eca7d5f7c4b200cb2db82f5410
-
SHA1
f6144493a8d498085473da407240ddcb00821027
-
SHA256
621dd2ea2c86536491ab62540a990d9c575d4ac11b00319106d86471844d6590
-
SHA512
a515f2c24edaa9de592ee986814f28b83fea12c2f9e7da699b14d5d9b3acbfad7b49d7656d4ea0a7fb157c47c483a7001d02190080365c9e9bc0b8da643b6f07
-
SSDEEP
384:Ec6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZA3:ge9EJLN/yRpcnu1
Behavioral task
behavioral1
Sample
621dd2ea2c86536491ab62540a990d9c575d4ac11b00319106d86471844d6590.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
621dd2ea2c86536491ab62540a990d9c575d4ac11b00319106d86471844d6590.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.7d
HacKed
falkonhacker.ddns.net:1177
4990d42069bd953a31ad864ca5c32a85
-
reg_key
4990d42069bd953a31ad864ca5c32a85
-
splitter
|'|'|
Targets
-
-
Target
621dd2ea2c86536491ab62540a990d9c575d4ac11b00319106d86471844d6590
-
Size
23KB
-
MD5
6b1b40eca7d5f7c4b200cb2db82f5410
-
SHA1
f6144493a8d498085473da407240ddcb00821027
-
SHA256
621dd2ea2c86536491ab62540a990d9c575d4ac11b00319106d86471844d6590
-
SHA512
a515f2c24edaa9de592ee986814f28b83fea12c2f9e7da699b14d5d9b3acbfad7b49d7656d4ea0a7fb157c47c483a7001d02190080365c9e9bc0b8da643b6f07
-
SSDEEP
384:Ec6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZA3:ge9EJLN/yRpcnu1
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-