General
-
Target
91d83becf536a7503dd281fbd799fbca4ea957ead28d5b3d6fc94adc30fe97ac
-
Size
144KB
-
Sample
221123-qya5gsfb54
-
MD5
3dcf062bb8a1676412f65399ac258461
-
SHA1
78a093996ee01a05e01387904a9f32f35510edf2
-
SHA256
91d83becf536a7503dd281fbd799fbca4ea957ead28d5b3d6fc94adc30fe97ac
-
SHA512
cf2676b21452f34289b138d8077bb57342b7b10d18fcb1f7d76a293c3a2e6a44f3eacc3fdd91b78afea132064d935ab733b2af480903b6b1a1ca48ce51101f56
-
SSDEEP
3072:u1a5yo1K4rFnHBXo/f+QqfABAh6S1/Z7iFAtp8VX:e4yOjNpzQAABAh6Srp8
Static task
static1
Behavioral task
behavioral1
Sample
91d83becf536a7503dd281fbd799fbca4ea957ead28d5b3d6fc94adc30fe97ac.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
91d83becf536a7503dd281fbd799fbca4ea957ead28d5b3d6fc94adc30fe97ac.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.6.4
admin
nnew748.myvnc.com:1177
749e61bd02cc756ea373bd81808cdf08
-
reg_key
749e61bd02cc756ea373bd81808cdf08
-
splitter
|'|'|
Targets
-
-
Target
91d83becf536a7503dd281fbd799fbca4ea957ead28d5b3d6fc94adc30fe97ac
-
Size
144KB
-
MD5
3dcf062bb8a1676412f65399ac258461
-
SHA1
78a093996ee01a05e01387904a9f32f35510edf2
-
SHA256
91d83becf536a7503dd281fbd799fbca4ea957ead28d5b3d6fc94adc30fe97ac
-
SHA512
cf2676b21452f34289b138d8077bb57342b7b10d18fcb1f7d76a293c3a2e6a44f3eacc3fdd91b78afea132064d935ab733b2af480903b6b1a1ca48ce51101f56
-
SSDEEP
3072:u1a5yo1K4rFnHBXo/f+QqfABAh6S1/Z7iFAtp8VX:e4yOjNpzQAABAh6Srp8
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-