General
-
Target
7a8e070febd1f501840593226e1784a4a6b676013d194c4cdd015a76b5572020
-
Size
29KB
-
Sample
221003-be7xsaaaa3
-
MD5
6c76e557ce658cb798a0741aa706b160
-
SHA1
7e22778e0080d104b25d5bbf0da0ab41f682bd28
-
SHA256
7a8e070febd1f501840593226e1784a4a6b676013d194c4cdd015a76b5572020
-
SHA512
475a5291f2c87c440e2bd3f2f9971296add671a8a58a2e94ecd9dc277be9e957698e1b636559a5e8958de8679da35ac988008caf550c534a18d0fb6633c86333
-
SSDEEP
384:CFpQjtl7jBnoKoK3JX15nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZzs:Ci7hoKoGJFNK4Aq1RehBKh0p29SgRd2
Behavioral task
behavioral1
Sample
7a8e070febd1f501840593226e1784a4a6b676013d194c4cdd015a76b5572020.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a8e070febd1f501840593226e1784a4a6b676013d194c4cdd015a76b5572020.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.6.4
HacKed
127.0.0.1:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Targets
-
-
Target
7a8e070febd1f501840593226e1784a4a6b676013d194c4cdd015a76b5572020
-
Size
29KB
-
MD5
6c76e557ce658cb798a0741aa706b160
-
SHA1
7e22778e0080d104b25d5bbf0da0ab41f682bd28
-
SHA256
7a8e070febd1f501840593226e1784a4a6b676013d194c4cdd015a76b5572020
-
SHA512
475a5291f2c87c440e2bd3f2f9971296add671a8a58a2e94ecd9dc277be9e957698e1b636559a5e8958de8679da35ac988008caf550c534a18d0fb6633c86333
-
SSDEEP
384:CFpQjtl7jBnoKoK3JX15nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZzs:Ci7hoKoGJFNK4Aq1RehBKh0p29SgRd2
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-