General
-
Target
ca6b84df7841a08e35869a4cdd96acd30399b03f508d3672b41a13bb396f37aa
-
Size
31KB
-
Sample
221121-28s9labb25
-
MD5
60232e8e9414a762af4d531c56b9d78c
-
SHA1
97d847407f714277587daa41dd13dbc6bda9556f
-
SHA256
ca6b84df7841a08e35869a4cdd96acd30399b03f508d3672b41a13bb396f37aa
-
SHA512
ce2c7f99acf1ba84d48adc1c3f3eb171c44262ecf0d3fde3617d3db58aac6817fc51e21880ff013905044cc6775e078d99d02b1527163db1cebefeec1540596d
-
SSDEEP
768:YZ7nMsanzR+2cqEDveyBKh0p29SgRXwy:W7nSQtD7KhG29jXw
Behavioral task
behavioral1
Sample
ca6b84df7841a08e35869a4cdd96acd30399b03f508d3672b41a13bb396f37aa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ca6b84df7841a08e35869a4cdd96acd30399b03f508d3672b41a13bb396f37aa.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.6.4
HacKed
srsrytop52.no-ip.org:1177
b5e1a09cd48d2dc8fb55d831499d952b
-
reg_key
b5e1a09cd48d2dc8fb55d831499d952b
-
splitter
|'|'|
Targets
-
-
Target
ca6b84df7841a08e35869a4cdd96acd30399b03f508d3672b41a13bb396f37aa
-
Size
31KB
-
MD5
60232e8e9414a762af4d531c56b9d78c
-
SHA1
97d847407f714277587daa41dd13dbc6bda9556f
-
SHA256
ca6b84df7841a08e35869a4cdd96acd30399b03f508d3672b41a13bb396f37aa
-
SHA512
ce2c7f99acf1ba84d48adc1c3f3eb171c44262ecf0d3fde3617d3db58aac6817fc51e21880ff013905044cc6775e078d99d02b1527163db1cebefeec1540596d
-
SSDEEP
768:YZ7nMsanzR+2cqEDveyBKh0p29SgRXwy:W7nSQtD7KhG29jXw
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-