General
-
Target
838eb7c04e0c1306403ece64cf100352d833d7c8440f3273e701f6478fbfeea2
-
Size
81KB
-
Sample
221002-r5ksyabbf3
-
MD5
648f447ef46ad487b37527f469df0010
-
SHA1
65bc52c369003382def306c4556e38200f3c7b38
-
SHA256
838eb7c04e0c1306403ece64cf100352d833d7c8440f3273e701f6478fbfeea2
-
SHA512
5d0405455767f8ba932800465050cb7f670ded3b604694ea3ab3a0b6380064ad3bb4e1a1ef96f7771520524c5d410843fd94d03972f57c99b060781ef827bb70
-
SSDEEP
1536:OBSXEetLkkvlOt86NnJsmxqpELT4qg8gwwpqvtd:OBSXEeFftOFNJTxqi+8gwjn
Static task
static1
Behavioral task
behavioral1
Sample
838eb7c04e0c1306403ece64cf100352d833d7c8440f3273e701f6478fbfeea2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
838eb7c04e0c1306403ece64cf100352d833d7c8440f3273e701f6478fbfeea2.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.6.4
HacKed By Zr_Exe
skorepyo1.no-ip.org:1177
b7c77f48dde2ad69a039c2aceab2d240
-
reg_key
b7c77f48dde2ad69a039c2aceab2d240
-
splitter
|'|'|
Targets
-
-
Target
838eb7c04e0c1306403ece64cf100352d833d7c8440f3273e701f6478fbfeea2
-
Size
81KB
-
MD5
648f447ef46ad487b37527f469df0010
-
SHA1
65bc52c369003382def306c4556e38200f3c7b38
-
SHA256
838eb7c04e0c1306403ece64cf100352d833d7c8440f3273e701f6478fbfeea2
-
SHA512
5d0405455767f8ba932800465050cb7f670ded3b604694ea3ab3a0b6380064ad3bb4e1a1ef96f7771520524c5d410843fd94d03972f57c99b060781ef827bb70
-
SSDEEP
1536:OBSXEetLkkvlOt86NnJsmxqpELT4qg8gwwpqvtd:OBSXEeFftOFNJTxqi+8gwjn
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-