General
-
Target
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c
-
Size
135KB
-
Sample
221004-bs4saafeb7
-
MD5
5545ae28ff0bebf154aef083b82850b0
-
SHA1
475f7df3a0fd6c97fa5b3f7847e67e259f144cb5
-
SHA256
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c
-
SHA512
a6b1ba07a7a1786625dee19d412ed27e6ba4380f89c00681e662b4162f56d46527189f8a0d4e9962875360998be1e29fb654397e2534f60b777466d585ee451f
-
SSDEEP
3072:2nj9jtfU+INndIc0J45iTgmygDgRrmIWdoQGq00D:2jbeiVVDgRI3GqN
Static task
static1
Behavioral task
behavioral1
Sample
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.7d
HacKed
turkmurat.no-ip.org:1604
632188ae0b130ac89e674b99bc07ac55
-
reg_key
632188ae0b130ac89e674b99bc07ac55
-
splitter
|'|'|
Targets
-
-
Target
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c
-
Size
135KB
-
MD5
5545ae28ff0bebf154aef083b82850b0
-
SHA1
475f7df3a0fd6c97fa5b3f7847e67e259f144cb5
-
SHA256
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c
-
SHA512
a6b1ba07a7a1786625dee19d412ed27e6ba4380f89c00681e662b4162f56d46527189f8a0d4e9962875360998be1e29fb654397e2534f60b777466d585ee451f
-
SSDEEP
3072:2nj9jtfU+INndIc0J45iTgmygDgRrmIWdoQGq00D:2jbeiVVDgRI3GqN
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-