General
-
Target
5b99728972e2c0f603c3bdb4995a30d10d586db97236e2f94b4017296312e308
-
Size
23KB
-
Sample
221003-blejtabgbj
-
MD5
45f7e1208e96bfb0ab850da7a80026a0
-
SHA1
30837abde559e5b4c856c437a28b96e7162f4321
-
SHA256
5b99728972e2c0f603c3bdb4995a30d10d586db97236e2f94b4017296312e308
-
SHA512
0eb5a7f6b757397ebda8279075a36e769306e59b60b79e74d927adc169b9b4b0d2e9b47c48cf7f8d46eb223f4750d2b9e650d947710564ab334961f7ac309494
-
SSDEEP
384:68aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kN:9Xcwt3tRpcnuJI
Behavioral task
behavioral1
Sample
5b99728972e2c0f603c3bdb4995a30d10d586db97236e2f94b4017296312e308.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5b99728972e2c0f603c3bdb4995a30d10d586db97236e2f94b4017296312e308.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
279f6960ed84a752570aca7fb2dc1552
-
reg_key
279f6960ed84a752570aca7fb2dc1552
-
splitter
|'|'|
Targets
-
-
Target
5b99728972e2c0f603c3bdb4995a30d10d586db97236e2f94b4017296312e308
-
Size
23KB
-
MD5
45f7e1208e96bfb0ab850da7a80026a0
-
SHA1
30837abde559e5b4c856c437a28b96e7162f4321
-
SHA256
5b99728972e2c0f603c3bdb4995a30d10d586db97236e2f94b4017296312e308
-
SHA512
0eb5a7f6b757397ebda8279075a36e769306e59b60b79e74d927adc169b9b4b0d2e9b47c48cf7f8d46eb223f4750d2b9e650d947710564ab334961f7ac309494
-
SSDEEP
384:68aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZ8kN:9Xcwt3tRpcnuJI
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-