General
-
Target
ab66c6e473af8c24d185b542dbcd204af0daf9d220ff97861deabb86ac636478
-
Size
338KB
-
Sample
221002-r5hzcacffq
-
MD5
66cb58b83a174b565129d99b2236af80
-
SHA1
77943715633b6b028da8e6e90e9bdfdd4f0a2c59
-
SHA256
ab66c6e473af8c24d185b542dbcd204af0daf9d220ff97861deabb86ac636478
-
SHA512
2df04457ca3fd9e94a1487ec765615dd884888f38ab654d369bebf64d27bed6bcc6321f50e647758e9f95c71980edbcbc66cfddf9a4d6c376ee63819668983e9
-
SSDEEP
3072:uGnurkvWoy0+w6jpGyFWWH27TkJionKuS6:uGpWpPW/EC
Static task
static1
Behavioral task
behavioral1
Sample
ab66c6e473af8c24d185b542dbcd204af0daf9d220ff97861deabb86ac636478.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab66c6e473af8c24d185b542dbcd204af0daf9d220ff97861deabb86ac636478.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.6.4
HacKed
vbre231.no-ip.biz:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Targets
-
-
Target
ab66c6e473af8c24d185b542dbcd204af0daf9d220ff97861deabb86ac636478
-
Size
338KB
-
MD5
66cb58b83a174b565129d99b2236af80
-
SHA1
77943715633b6b028da8e6e90e9bdfdd4f0a2c59
-
SHA256
ab66c6e473af8c24d185b542dbcd204af0daf9d220ff97861deabb86ac636478
-
SHA512
2df04457ca3fd9e94a1487ec765615dd884888f38ab654d369bebf64d27bed6bcc6321f50e647758e9f95c71980edbcbc66cfddf9a4d6c376ee63819668983e9
-
SSDEEP
3072:uGnurkvWoy0+w6jpGyFWWH27TkJionKuS6:uGpWpPW/EC
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-