General
-
Target
4fe14f7fed41f8e1fb8a871ac7dd25d2fa3b656b1a93ef4049227c82fc3ac2c1
-
Size
79KB
-
Sample
221002-qtgrgaghf2
-
MD5
6d72d1863acdb764df854fb0abd38860
-
SHA1
def38fdd1249b8077d6a7e1ec13f0297f7e87b8b
-
SHA256
4fe14f7fed41f8e1fb8a871ac7dd25d2fa3b656b1a93ef4049227c82fc3ac2c1
-
SHA512
d8bb01462303a4be3b484eacd82ce63710e0a1733c90e0becc14c3647950c1271bbb43ff859efb2bef9d83478b4458567af27829ad20d228230efe831fa7c7b8
-
SSDEEP
1536:hm7N1XfdFKhG29jbdF6NCOXTvJOpH8TBg5UjlfUsNJiRb6N5p:hc1X1MA29zgTB4W/dERu
Behavioral task
behavioral1
Sample
4fe14f7fed41f8e1fb8a871ac7dd25d2fa3b656b1a93ef4049227c82fc3ac2c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4fe14f7fed41f8e1fb8a871ac7dd25d2fa3b656b1a93ef4049227c82fc3ac2c1.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.6.4
HacKed
wallalhazen.no-ip.org:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Targets
-
-
Target
4fe14f7fed41f8e1fb8a871ac7dd25d2fa3b656b1a93ef4049227c82fc3ac2c1
-
Size
79KB
-
MD5
6d72d1863acdb764df854fb0abd38860
-
SHA1
def38fdd1249b8077d6a7e1ec13f0297f7e87b8b
-
SHA256
4fe14f7fed41f8e1fb8a871ac7dd25d2fa3b656b1a93ef4049227c82fc3ac2c1
-
SHA512
d8bb01462303a4be3b484eacd82ce63710e0a1733c90e0becc14c3647950c1271bbb43ff859efb2bef9d83478b4458567af27829ad20d228230efe831fa7c7b8
-
SSDEEP
1536:hm7N1XfdFKhG29jbdF6NCOXTvJOpH8TBg5UjlfUsNJiRb6N5p:hc1X1MA29zgTB4W/dERu
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-