General
-
Target
70664d8f9052a7d96fade62f84010761aa10e68c7a03e8dc5785710f991b67e8
-
Size
29KB
-
Sample
221123-lnlq1sfc3w
-
MD5
394898effddbcb4730c06d1564af978d
-
SHA1
1eb2c9b1923ca8b9d8b3cdbef872506a6d74680d
-
SHA256
70664d8f9052a7d96fade62f84010761aa10e68c7a03e8dc5785710f991b67e8
-
SHA512
866c07fba65067545339f91335fca9c459f6bec20eaab28dfb53b68f73ac44a6a569490e17927c97cbac0e81c2826425908ce74a3524983dd243b7f3c0322f6c
-
SSDEEP
384:aBgJGJl7tj1Msagab1h5Vh+2CWmqDebD59ePbGBsbh0w4wlAokw9OhgOL1vYRGOG:aZ7nMsanzR+2cqEDveyBKh0p29SgRJO
Behavioral task
behavioral1
Sample
70664d8f9052a7d96fade62f84010761aa10e68c7a03e8dc5785710f991b67e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
70664d8f9052a7d96fade62f84010761aa10e68c7a03e8dc5785710f991b67e8.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
0.6.4
HacKed
mhacker783.no-ip.org:1177
dda179c09ae689633f05cced9ee19fb5
-
reg_key
dda179c09ae689633f05cced9ee19fb5
-
splitter
|'|'|
Targets
-
-
Target
70664d8f9052a7d96fade62f84010761aa10e68c7a03e8dc5785710f991b67e8
-
Size
29KB
-
MD5
394898effddbcb4730c06d1564af978d
-
SHA1
1eb2c9b1923ca8b9d8b3cdbef872506a6d74680d
-
SHA256
70664d8f9052a7d96fade62f84010761aa10e68c7a03e8dc5785710f991b67e8
-
SHA512
866c07fba65067545339f91335fca9c459f6bec20eaab28dfb53b68f73ac44a6a569490e17927c97cbac0e81c2826425908ce74a3524983dd243b7f3c0322f6c
-
SSDEEP
384:aBgJGJl7tj1Msagab1h5Vh+2CWmqDebD59ePbGBsbh0w4wlAokw9OhgOL1vYRGOG:aZ7nMsanzR+2cqEDveyBKh0p29SgRJO
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-