General
-
Target
291957bae379206e49923abb253b2c7e1ac4e5284b3490d736aa396a1dc2baef
-
Size
23KB
-
Sample
221123-r3vv5aac78
-
MD5
a56bfdad420792958d3cb2bdf4c09f3b
-
SHA1
6a9cbb76b10dd5e2dce4f843bc53057d8a73d304
-
SHA256
291957bae379206e49923abb253b2c7e1ac4e5284b3490d736aa396a1dc2baef
-
SHA512
b539aad86a9880fdc674673afdbbaf30b819ca3e79e4b8e404302d83f64b13c665d430222784c6f43722333b76b447e12eefd5d4da006db27623f1ebe965e9b0
-
SSDEEP
384:CwTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RtmRvR6JZlbw8hqIusZzZum7:hvZiBK1edJRpcnuh4
Behavioral task
behavioral1
Sample
291957bae379206e49923abb253b2c7e1ac4e5284b3490d736aa396a1dc2baef.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
291957bae379206e49923abb253b2c7e1ac4e5284b3490d736aa396a1dc2baef.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.7d
SILENT.THM
silent1213.no-ip.biz:5552
69f4a342b3ced3a141770e9ba14bb6e5
-
reg_key
69f4a342b3ced3a141770e9ba14bb6e5
-
splitter
|'|'|
Targets
-
-
Target
291957bae379206e49923abb253b2c7e1ac4e5284b3490d736aa396a1dc2baef
-
Size
23KB
-
MD5
a56bfdad420792958d3cb2bdf4c09f3b
-
SHA1
6a9cbb76b10dd5e2dce4f843bc53057d8a73d304
-
SHA256
291957bae379206e49923abb253b2c7e1ac4e5284b3490d736aa396a1dc2baef
-
SHA512
b539aad86a9880fdc674673afdbbaf30b819ca3e79e4b8e404302d83f64b13c665d430222784c6f43722333b76b447e12eefd5d4da006db27623f1ebe965e9b0
-
SSDEEP
384:CwTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RtmRvR6JZlbw8hqIusZzZum7:hvZiBK1edJRpcnuh4
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-