General
-
Target
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
-
Size
33KB
-
Sample
221003-cxejmacca7
-
MD5
538a95adc47384e2b9cc837488628de8
-
SHA1
d0ead0592e2f891d1304be71ccd755c78e94adfa
-
SHA256
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
-
SHA512
947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627
-
SSDEEP
384:CDKimCftl7ndJoc8e9v55Do7mmmqDspHe4qGBsbh0w4wlAokw9OhgOL1vYRGOZz9:oKAD7zoc86xi74q8HeoBKh0p29SgRoo
Behavioral task
behavioral1
Sample
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.6.4
Boy Hacker Kurdish
boyhacker.no-ip.org:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Targets
-
-
Target
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
-
Size
33KB
-
MD5
538a95adc47384e2b9cc837488628de8
-
SHA1
d0ead0592e2f891d1304be71ccd755c78e94adfa
-
SHA256
926ec604fc6598362b361d3c56db967fb1566cf8c82723921d482a540679e642
-
SHA512
947e0b370b1599d2957441ba203ffcae7dff19c7a12e76613bf9ee839fd46a311689c349ee7a721fc2e8170a55ee64a1c062f13f891d8279abe83d881f3ce627
-
SSDEEP
384:CDKimCftl7ndJoc8e9v55Do7mmmqDspHe4qGBsbh0w4wlAokw9OhgOL1vYRGOZz9:oKAD7zoc86xi74q8HeoBKh0p29SgRoo
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-