General
-
Target
74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8.exe
-
Size
572KB
-
Sample
221002-zz1wzaagh2
-
MD5
3c62f18b9cc44d48e2187bf66d9fae04
-
SHA1
7010bf5ae66555b4891eb32b9e7b1e2ab603bf8b
-
SHA256
74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8
-
SHA512
2f82f30fbfe30b2be09538e9c0c465aa9fd71135e42cd9103b56a1ed4dbabcf1347475aa78277d7b87ade5c217e20f39896466cd3309010a81208015d1b028d6
-
SSDEEP
12288:hToPWBv/cpGrU3yXoT77F1KQSSOS14Gr59aAqg4/G:hTbBv5rUfFnSST14GrfAR/G
Static task
static1
Behavioral task
behavioral1
Sample
74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8.exe
Resource
win10-20220812-en
Malware Config
Extracted
njrat
0.7d
HacKed
FRANSESCOTQ3LjE4NS4yFRANSESCOjEuFRANSESCOjEx:MjAxMTE=
15c02f637abec4a65e1044f0fcf0abcc
-
reg_key
15c02f637abec4a65e1044f0fcf0abcc
-
splitter
|'|'|
Targets
-
-
Target
74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8.exe
-
Size
572KB
-
MD5
3c62f18b9cc44d48e2187bf66d9fae04
-
SHA1
7010bf5ae66555b4891eb32b9e7b1e2ab603bf8b
-
SHA256
74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8
-
SHA512
2f82f30fbfe30b2be09538e9c0c465aa9fd71135e42cd9103b56a1ed4dbabcf1347475aa78277d7b87ade5c217e20f39896466cd3309010a81208015d1b028d6
-
SSDEEP
12288:hToPWBv/cpGrU3yXoT77F1KQSSOS14Gr59aAqg4/G:hTbBv5rUfFnSST14GrfAR/G
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-