General
-
Target
a4cf7bd0cc9fefcb6265492a1c4e139e210e874028dfb6f27693a882f88293ee
-
Size
57KB
-
Sample
221029-p61jnshagr
-
MD5
c5d18393ac40ddb909f213c290e38733
-
SHA1
b6958e2ce585357eb50ab2a03e32f724a368331f
-
SHA256
a4cf7bd0cc9fefcb6265492a1c4e139e210e874028dfb6f27693a882f88293ee
-
SHA512
7d6eb7acde2f20571c4cbea754958deeabdbca6e31ccdfe67677cc7e72c78f6b16bc61088877b9afca21331a60eb611fcd97faa3a23c4c6cfabf391e76ba3e55
-
SSDEEP
768:Mb9glF51LRpcnuh4/rB6H3vv64DnMAOXYGlsPsHJ:49glpLRWuh4/kXv/MBXRWkH
Behavioral task
behavioral1
Sample
a4cf7bd0cc9fefcb6265492a1c4e139e210e874028dfb6f27693a882f88293ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4cf7bd0cc9fefcb6265492a1c4e139e210e874028dfb6f27693a882f88293ee.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.7d
Citadel
loco-repo.noip.me:1993
0ea87091359bfa57e58b817aa3bc045c
-
reg_key
0ea87091359bfa57e58b817aa3bc045c
-
splitter
|'|'|
Targets
-
-
Target
a4cf7bd0cc9fefcb6265492a1c4e139e210e874028dfb6f27693a882f88293ee
-
Size
57KB
-
MD5
c5d18393ac40ddb909f213c290e38733
-
SHA1
b6958e2ce585357eb50ab2a03e32f724a368331f
-
SHA256
a4cf7bd0cc9fefcb6265492a1c4e139e210e874028dfb6f27693a882f88293ee
-
SHA512
7d6eb7acde2f20571c4cbea754958deeabdbca6e31ccdfe67677cc7e72c78f6b16bc61088877b9afca21331a60eb611fcd97faa3a23c4c6cfabf391e76ba3e55
-
SSDEEP
768:Mb9glF51LRpcnuh4/rB6H3vv64DnMAOXYGlsPsHJ:49glpLRWuh4/kXv/MBXRWkH
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-