General
-
Target
Purchase Order-new.exe
-
Size
6KB
-
Sample
221101-t1x9ksecgl
-
MD5
bf483dc9b494c3143835ec286c1c4360
-
SHA1
b3e6792d37d360bb28d37c25d44394e58f1d9b09
-
SHA256
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284
-
SHA512
f00e279b93014ee9284bb59f1cfdf0b9913a2745562dc0f389298ae654736572e98f2cca89b8925dddbf4a254680e53ce4827fb5fff654bb82a1a926bb5a1dce
-
SSDEEP
96:OKqxIGt9iNzw8IdvzrlsllTyQRx2/JwyruI+cZ3GnUODL:5qimu5ImllO4xIyyBxZv0
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order-new.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Purchase Order-new.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
v2.0
update
money2022.ddns.net:8080
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
Purchase Order-new.exe
-
Size
6KB
-
MD5
bf483dc9b494c3143835ec286c1c4360
-
SHA1
b3e6792d37d360bb28d37c25d44394e58f1d9b09
-
SHA256
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284
-
SHA512
f00e279b93014ee9284bb59f1cfdf0b9913a2745562dc0f389298ae654736572e98f2cca89b8925dddbf4a254680e53ce4827fb5fff654bb82a1a926bb5a1dce
-
SSDEEP
96:OKqxIGt9iNzw8IdvzrlsllTyQRx2/JwyruI+cZ3GnUODL:5qimu5ImllO4xIyyBxZv0
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-