General
-
Target
d748d6a023d67f97f954a7caf218533dabb87faf846f6726e83516c553bceaa5
-
Size
30KB
-
Sample
221123-s8h9ysdc75
-
MD5
4a1f729ab449aebf18a7c07caf2ce9bd
-
SHA1
d5a4c754fa7cde06af3e229fb6077c95d1dfc04c
-
SHA256
d748d6a023d67f97f954a7caf218533dabb87faf846f6726e83516c553bceaa5
-
SHA512
c812e4fb7c7a420493f9f375cdd8cf608e63f4caa80e44682945bb8370a72e3ccffd7f5869e8ff7be0889f492f7eadb829a78e80cb86da6fa9bca3165837c172
-
SSDEEP
384:agaFCtl7Dh+oqIqEtl5rBGAiumqDUtDe4qGBsbh0w4wlAokw9OhgOL1vYRGOZzJ1:aC74oqIjjLGAcqoDeABKh0p29SgRhsH
Behavioral task
behavioral1
Sample
d748d6a023d67f97f954a7caf218533dabb87faf846f6726e83516c553bceaa5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d748d6a023d67f97f954a7caf218533dabb87faf846f6726e83516c553bceaa5.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.6.4
HackeD By Gmayka
ramyok.no-ip.biz:1177
af029b7100cbb27d8c0472b97315e8d5
-
reg_key
af029b7100cbb27d8c0472b97315e8d5
-
splitter
|'|'|
Targets
-
-
Target
d748d6a023d67f97f954a7caf218533dabb87faf846f6726e83516c553bceaa5
-
Size
30KB
-
MD5
4a1f729ab449aebf18a7c07caf2ce9bd
-
SHA1
d5a4c754fa7cde06af3e229fb6077c95d1dfc04c
-
SHA256
d748d6a023d67f97f954a7caf218533dabb87faf846f6726e83516c553bceaa5
-
SHA512
c812e4fb7c7a420493f9f375cdd8cf608e63f4caa80e44682945bb8370a72e3ccffd7f5869e8ff7be0889f492f7eadb829a78e80cb86da6fa9bca3165837c172
-
SSDEEP
384:agaFCtl7Dh+oqIqEtl5rBGAiumqDUtDe4qGBsbh0w4wlAokw9OhgOL1vYRGOZzJ1:aC74oqIjjLGAcqoDeABKh0p29SgRhsH
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-