General
-
Target
9228D8C44CDC5CC4D82EC3FE68379C6C5938BC04702CF.exe
-
Size
6.2MB
-
Sample
221025-1tb64aeadk
-
MD5
cc95e0f6886ee79017f070ceedbb17e3
-
SHA1
e628e3331228741760644b0716b6e66f7a37324c
-
SHA256
9228d8c44cdc5cc4d82ec3fe68379c6c5938bc04702cfc86b9b8c96872b52a68
-
SHA512
f50b798226c81db56187e59b258d2e857dc28da6cb42a047e0ffb5da2dc4c95f68d3d8788cec8a15635718a345d98f8c2c5e579101cbd88493e2d4805d7f5136
-
SSDEEP
98304:u5hHwzlKTDbdRGQSxUTZeNEiIK176ykGlnrHL21sHHLrHIatQts6mughHLo:uwzoTDp4QeUpg176KlnrHiGYDdmughH
Behavioral task
behavioral1
Sample
9228D8C44CDC5CC4D82EC3FE68379C6C5938BC04702CF.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9228D8C44CDC5CC4D82EC3FE68379C6C5938BC04702CF.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
Carbonblack2102
batvoi
1368.vnh.wtf:5552
0de45b5c6627a3e65a4b2a1e68ec841b
-
reg_key
0de45b5c6627a3e65a4b2a1e68ec841b
-
splitter
|'|'|
Targets
-
-
Target
9228D8C44CDC5CC4D82EC3FE68379C6C5938BC04702CF.exe
-
Size
6.2MB
-
MD5
cc95e0f6886ee79017f070ceedbb17e3
-
SHA1
e628e3331228741760644b0716b6e66f7a37324c
-
SHA256
9228d8c44cdc5cc4d82ec3fe68379c6c5938bc04702cfc86b9b8c96872b52a68
-
SHA512
f50b798226c81db56187e59b258d2e857dc28da6cb42a047e0ffb5da2dc4c95f68d3d8788cec8a15635718a345d98f8c2c5e579101cbd88493e2d4805d7f5136
-
SSDEEP
98304:u5hHwzlKTDbdRGQSxUTZeNEiIK176ykGlnrHL21sHHLrHIatQts6mughHLo:uwzoTDp4QeUpg176KlnrHiGYDdmughH
-
Taurus Stealer payload
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-