General
-
Target
07791fb56cf814297a1b73c274801e35fa31446e5b5aa4c802c55b6b527432c0
-
Size
29KB
-
Sample
221122-x5dyaahh3x
-
MD5
5fde4b1e9f6cd4c5a409ce419e8a32e2
-
SHA1
84fafcc2ba89f3aeafa83f6407011740b77b58f0
-
SHA256
07791fb56cf814297a1b73c274801e35fa31446e5b5aa4c802c55b6b527432c0
-
SHA512
2ff9af63e1638e03816b15314229cfc1bf354376e8ba919f673233d65eef13fafb8d004039b496ce1d9b9a70ad3410b1f292fffb9d7737900fca2ea33b8953b3
-
SSDEEP
384:yFpQjtl7jBnoKoK3JX15nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZzD:yi7hoKoGJFNK4Aq1RehBKh0p29SgRSQ
Behavioral task
behavioral1
Sample
07791fb56cf814297a1b73c274801e35fa31446e5b5aa4c802c55b6b527432c0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
07791fb56cf814297a1b73c274801e35fa31446e5b5aa4c802c55b6b527432c0.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.6.4
system
127.0.0.1:1177
12ce4e06a81e8d54fd01d9b762f1b1bb
-
reg_key
12ce4e06a81e8d54fd01d9b762f1b1bb
-
splitter
|'|'|
Targets
-
-
Target
07791fb56cf814297a1b73c274801e35fa31446e5b5aa4c802c55b6b527432c0
-
Size
29KB
-
MD5
5fde4b1e9f6cd4c5a409ce419e8a32e2
-
SHA1
84fafcc2ba89f3aeafa83f6407011740b77b58f0
-
SHA256
07791fb56cf814297a1b73c274801e35fa31446e5b5aa4c802c55b6b527432c0
-
SHA512
2ff9af63e1638e03816b15314229cfc1bf354376e8ba919f673233d65eef13fafb8d004039b496ce1d9b9a70ad3410b1f292fffb9d7737900fca2ea33b8953b3
-
SSDEEP
384:yFpQjtl7jBnoKoK3JX15nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZzD:yi7hoKoGJFNK4Aq1RehBKh0p29SgRSQ
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-