General
-
Target
8e89bfc3381d4c122767c66799c5502e62b998cd229a4f03eccbc1d845960308
-
Size
23KB
-
Sample
221003-trzfaaedg9
-
MD5
6a49d3f2f3d0d192dede1fedcdb86870
-
SHA1
ded1f9fa0bcdd670e3277f51596d612672355e29
-
SHA256
8e89bfc3381d4c122767c66799c5502e62b998cd229a4f03eccbc1d845960308
-
SHA512
80e80e2da91f201df3f48ec656b5f332ce194749f57c20f5f79e5785dc4c1c76494290e9b2c119b79ca53031851d6e588476a1e5d1808f58f9b3835e14358ceb
-
SSDEEP
384:BQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZl/:W5yBVd7Rpcnui
Behavioral task
behavioral1
Sample
8e89bfc3381d4c122767c66799c5502e62b998cd229a4f03eccbc1d845960308.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8e89bfc3381d4c122767c66799c5502e62b998cd229a4f03eccbc1d845960308.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.7d
HacKed
kingshacking.zapto.org:81
ddba3ff35ad40cfacb2b222b7c8bc6a1
-
reg_key
ddba3ff35ad40cfacb2b222b7c8bc6a1
-
splitter
|'|'|
Targets
-
-
Target
8e89bfc3381d4c122767c66799c5502e62b998cd229a4f03eccbc1d845960308
-
Size
23KB
-
MD5
6a49d3f2f3d0d192dede1fedcdb86870
-
SHA1
ded1f9fa0bcdd670e3277f51596d612672355e29
-
SHA256
8e89bfc3381d4c122767c66799c5502e62b998cd229a4f03eccbc1d845960308
-
SHA512
80e80e2da91f201df3f48ec656b5f332ce194749f57c20f5f79e5785dc4c1c76494290e9b2c119b79ca53031851d6e588476a1e5d1808f58f9b3835e14358ceb
-
SSDEEP
384:BQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZl/:W5yBVd7Rpcnui
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-