General
-
Target
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7
-
Size
28KB
-
Sample
221003-bqltpabhep
-
MD5
78efb2985f75a78d6eb60c9e20105a00
-
SHA1
5365036ebf892aa15b99593f3c848c05e55e7e38
-
SHA256
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7
-
SHA512
5e70b73e881b9ffe063569f633bda66d013859d6766670df8d29f9f6445915b17b7d68af58376bdfedf5979221146633d0f280d90f0075eb39fece2773254252
-
SSDEEP
384:AxUHEBl7p3hUw2s7bD55gEKemqDSqre/IDGBsbh0w4wlAokw9OhgOL1vYRGOZzZ/:A17bUw2C3kEcqNreHBKh0p29SgRjp
Behavioral task
behavioral1
Sample
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.6.4
HacKed
ahmedtita.ddns.net:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Targets
-
-
Target
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7
-
Size
28KB
-
MD5
78efb2985f75a78d6eb60c9e20105a00
-
SHA1
5365036ebf892aa15b99593f3c848c05e55e7e38
-
SHA256
426abfa4ec6c86403dfb903d45ac1cac6d06db5e7972e3efaaf8f270d5fdaad7
-
SHA512
5e70b73e881b9ffe063569f633bda66d013859d6766670df8d29f9f6445915b17b7d68af58376bdfedf5979221146633d0f280d90f0075eb39fece2773254252
-
SSDEEP
384:AxUHEBl7p3hUw2s7bD55gEKemqDSqre/IDGBsbh0w4wlAokw9OhgOL1vYRGOZzZ/:A17bUw2C3kEcqNreHBKh0p29SgRjp
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-