General
-
Target
cc12b69766a3cbe0621fdfc4d297b4841888b9a273a6fc9ae05af9476632350b
-
Size
23KB
-
Sample
221003-qsqmzshdcl
-
MD5
699d8897247b3fbc787743f23e0915c0
-
SHA1
6dd7ae8e2953ba033db6a13e5ce083a7063e1c17
-
SHA256
cc12b69766a3cbe0621fdfc4d297b4841888b9a273a6fc9ae05af9476632350b
-
SHA512
153bc1d1fe8c36478f48d16a75e583e965670a44c339ef96ef1095e859b53c29f4d77efe61de93b0323e8db4f3137ecc6c7ce46fa62e12358ec32976acbd855a
-
SSDEEP
384:28aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZVf:5Xcwt3tRpcnuK
Behavioral task
behavioral1
Sample
cc12b69766a3cbe0621fdfc4d297b4841888b9a273a6fc9ae05af9476632350b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc12b69766a3cbe0621fdfc4d297b4841888b9a273a6fc9ae05af9476632350b.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:1177
987d5a8ae3525b05543234bc5afa1b38
-
reg_key
987d5a8ae3525b05543234bc5afa1b38
-
splitter
|'|'|
Targets
-
-
Target
cc12b69766a3cbe0621fdfc4d297b4841888b9a273a6fc9ae05af9476632350b
-
Size
23KB
-
MD5
699d8897247b3fbc787743f23e0915c0
-
SHA1
6dd7ae8e2953ba033db6a13e5ce083a7063e1c17
-
SHA256
cc12b69766a3cbe0621fdfc4d297b4841888b9a273a6fc9ae05af9476632350b
-
SHA512
153bc1d1fe8c36478f48d16a75e583e965670a44c339ef96ef1095e859b53c29f4d77efe61de93b0323e8db4f3137ecc6c7ce46fa62e12358ec32976acbd855a
-
SSDEEP
384:28aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZVf:5Xcwt3tRpcnuK
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-