General
-
Target
560a03843b43481415212d470e50a73cda146e6ba2c6a191979a316dcad9ac10
-
Size
29KB
-
Sample
221004-cg3lhsgeg7
-
MD5
0036ff60d2d522bf3739171936eb5d00
-
SHA1
9be86ac9494b4ddb986c39dbd920685b606582ec
-
SHA256
560a03843b43481415212d470e50a73cda146e6ba2c6a191979a316dcad9ac10
-
SHA512
9855db7c69942f052fd9d5c055968f6a3cc79a9c2bd16e59db1cb780f72c0c8a92bf3250c6d52eb537246f69a9e04977db4a8fa3aede0d855b4762c059b7eb36
-
SSDEEP
384:YGYftl7H9zoJoc+MFvZ5jLp7mmmqDMJHenlGBsbh0w4wlAokw9OhgOL1vYRGOZzd:4D71oGc1FRVp74q8HesBKh0p29SgRLp
Behavioral task
behavioral1
Sample
560a03843b43481415212d470e50a73cda146e6ba2c6a191979a316dcad9ac10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
560a03843b43481415212d470e50a73cda146e6ba2c6a191979a316dcad9ac10.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.6.4
HacKed
anonghosts.no-ip.org:81
ba4c12bee3027d94da5c81db2d196bfd
-
reg_key
ba4c12bee3027d94da5c81db2d196bfd
-
splitter
|'|'|
Targets
-
-
Target
560a03843b43481415212d470e50a73cda146e6ba2c6a191979a316dcad9ac10
-
Size
29KB
-
MD5
0036ff60d2d522bf3739171936eb5d00
-
SHA1
9be86ac9494b4ddb986c39dbd920685b606582ec
-
SHA256
560a03843b43481415212d470e50a73cda146e6ba2c6a191979a316dcad9ac10
-
SHA512
9855db7c69942f052fd9d5c055968f6a3cc79a9c2bd16e59db1cb780f72c0c8a92bf3250c6d52eb537246f69a9e04977db4a8fa3aede0d855b4762c059b7eb36
-
SSDEEP
384:YGYftl7H9zoJoc+MFvZ5jLp7mmmqDMJHenlGBsbh0w4wlAokw9OhgOL1vYRGOZzd:4D71oGc1FRVp74q8HesBKh0p29SgRLp
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-