General
-
Target
5ed4fa4e971369c1f624a68caf0a4ad0619e2a0fe5ca5708a98d2cd9a5adde0a
-
Size
29KB
-
Sample
221122-xekm5sgg7t
-
MD5
55cf60a4842ef01b402ff44db6621bcb
-
SHA1
eaebe99a8f9a78a2b147d5be068372d2ae564161
-
SHA256
5ed4fa4e971369c1f624a68caf0a4ad0619e2a0fe5ca5708a98d2cd9a5adde0a
-
SHA512
55afc5cd8b64eccd0eeaed96a1238955b1c82aef0ed992bf56ab77b7e614f8bbc23fffbb45f4cd0cfc6c29bee09ff2a4b94ff61e5faa7be8f4d11e0b33c359d3
-
SSDEEP
384:LFpQjtl7jBnoKoK3JX15nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZz5:Li7hoKoGJFNK4Aq1RehBKh0p29SgRS6
Behavioral task
behavioral1
Sample
5ed4fa4e971369c1f624a68caf0a4ad0619e2a0fe5ca5708a98d2cd9a5adde0a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5ed4fa4e971369c1f624a68caf0a4ad0619e2a0fe5ca5708a98d2cd9a5adde0a.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.6.4
system
127.0.0.1:1177
12ce4e06a81e8d54fd01d9b762f1b1bb
-
reg_key
12ce4e06a81e8d54fd01d9b762f1b1bb
-
splitter
|'|'|
Targets
-
-
Target
5ed4fa4e971369c1f624a68caf0a4ad0619e2a0fe5ca5708a98d2cd9a5adde0a
-
Size
29KB
-
MD5
55cf60a4842ef01b402ff44db6621bcb
-
SHA1
eaebe99a8f9a78a2b147d5be068372d2ae564161
-
SHA256
5ed4fa4e971369c1f624a68caf0a4ad0619e2a0fe5ca5708a98d2cd9a5adde0a
-
SHA512
55afc5cd8b64eccd0eeaed96a1238955b1c82aef0ed992bf56ab77b7e614f8bbc23fffbb45f4cd0cfc6c29bee09ff2a4b94ff61e5faa7be8f4d11e0b33c359d3
-
SSDEEP
384:LFpQjtl7jBnoKoK3JX15nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZz5:Li7hoKoGJFNK4Aq1RehBKh0p29SgRS6
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-