General
-
Target
36f3522312d37afed37fb86396c48cf4bb444f8cb1c67f4adedcdedaae7d3c0e
-
Size
23KB
-
Sample
221020-gwrvsahag4
-
MD5
7c7c238e6dd52845112c299d914fd060
-
SHA1
38f816cfc0456892e2af0813b6123bddfe7d137a
-
SHA256
36f3522312d37afed37fb86396c48cf4bb444f8cb1c67f4adedcdedaae7d3c0e
-
SHA512
b0a8b7fbaece30cf799154f095fb9d8904b3ce176c3b0aecf2bdf5825754547c089fb2e66a44c226de69925891a1774a8eb8a81d6552f1a002b70c3903082229
-
SSDEEP
384:JQ+ILgIbOprgPsUOSU0kB1kd6dg7GYh/JomRvR6JZlbw8hqIusZzZsSH:8LL6MVU0NRpcnu6
Behavioral task
behavioral1
Sample
36f3522312d37afed37fb86396c48cf4bb444f8cb1c67f4adedcdedaae7d3c0e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
36f3522312d37afed37fb86396c48cf4bb444f8cb1c67f4adedcdedaae7d3c0e.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.7d
7
judo50.sytes.net:200
83390fd039c609d3df6e0d1261c35777
-
reg_key
83390fd039c609d3df6e0d1261c35777
-
splitter
|'|'|
Targets
-
-
Target
36f3522312d37afed37fb86396c48cf4bb444f8cb1c67f4adedcdedaae7d3c0e
-
Size
23KB
-
MD5
7c7c238e6dd52845112c299d914fd060
-
SHA1
38f816cfc0456892e2af0813b6123bddfe7d137a
-
SHA256
36f3522312d37afed37fb86396c48cf4bb444f8cb1c67f4adedcdedaae7d3c0e
-
SHA512
b0a8b7fbaece30cf799154f095fb9d8904b3ce176c3b0aecf2bdf5825754547c089fb2e66a44c226de69925891a1774a8eb8a81d6552f1a002b70c3903082229
-
SSDEEP
384:JQ+ILgIbOprgPsUOSU0kB1kd6dg7GYh/JomRvR6JZlbw8hqIusZzZsSH:8LL6MVU0NRpcnu6
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-