General
-
Target
Purchase Order-3949.img
-
Size
60KB
-
Sample
221031-td68zacbhp
-
MD5
20ddf8b3df5865e825606808e5c5c2d3
-
SHA1
da42463426bf5d7fa76eb154a423373eab4d5c89
-
SHA256
c743cceb40ece2a6b4f1e11b2d5634853a91fb6c5d119781c860be0f7ec18bc2
-
SHA512
f9e2c6e95bb7ce423f59c97114f6f991e014ba20fb67ff1510d162616f5ac41bfd504a57302e8b30a7a55fba8255eec4bfd89c17d206f005dd3332f4b95809a6
-
SSDEEP
192:x1Az57uraMskWOB72ebPd8stYcFmVc03KY:x1Az57uzBWOBqydptYcFmVc03K
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order-3949.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Purchase Order-3949.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
v2.0
update
money2022.ddns.net:8080
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
Purchase Order-3949.exe
-
Size
9KB
-
MD5
6dbda41adc2c005487f99f7691b0bd3e
-
SHA1
81c4647c3ed92ccf711f54184d0422548b9edbf2
-
SHA256
77dafa65cc482bfac093bdf278ca1a70fae90b59b756bdec1d581da3ea55953d
-
SHA512
98c83e56a5fc6577e54c054a68fa42b77c2bbe569656c76d8c062eaf40013e7fa7ff27eb41487b0501ddd3f42584285892e8fe2f0d81ef6ac4958b588b5238b1
-
SSDEEP
192:/1Az57uraMskWOB72ebPd8stYcFmVc03KY:/1Az57uzBWOBqydptYcFmVc03K
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-