General
-
Target
d5f936e0948611fc301c4ca8b85fc1012356a3f6f83e09e7c959087a4d5d6442
-
Size
23KB
-
Sample
221123-s9c5bsgd9x
-
MD5
5a8b08e5b56260b53bbf1222e3dda7b3
-
SHA1
f035b6f669365f18329406c036d9428019cae1c4
-
SHA256
d5f936e0948611fc301c4ca8b85fc1012356a3f6f83e09e7c959087a4d5d6442
-
SHA512
6236b614444c293c8aeae0bd16d33ac48c6e8e299ff4004e3448a1a2a048c992a995012d94b0f0c767cdb686ded8296a41ec219d5b0c4ffd29fa73912602a706
-
SSDEEP
384:zQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZHjd:k5yBVd7RpcnuC
Behavioral task
behavioral1
Sample
d5f936e0948611fc301c4ca8b85fc1012356a3f6f83e09e7c959087a4d5d6442.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d5f936e0948611fc301c4ca8b85fc1012356a3f6f83e09e7c959087a4d5d6442.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
0.7d
HacKed
sahinerol1.no-ip.org:1221
dc3fcc213130c10fcc359eeec1ff3b0f
-
reg_key
dc3fcc213130c10fcc359eeec1ff3b0f
-
splitter
|'|'|
Targets
-
-
Target
d5f936e0948611fc301c4ca8b85fc1012356a3f6f83e09e7c959087a4d5d6442
-
Size
23KB
-
MD5
5a8b08e5b56260b53bbf1222e3dda7b3
-
SHA1
f035b6f669365f18329406c036d9428019cae1c4
-
SHA256
d5f936e0948611fc301c4ca8b85fc1012356a3f6f83e09e7c959087a4d5d6442
-
SHA512
6236b614444c293c8aeae0bd16d33ac48c6e8e299ff4004e3448a1a2a048c992a995012d94b0f0c767cdb686ded8296a41ec219d5b0c4ffd29fa73912602a706
-
SSDEEP
384:zQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZHjd:k5yBVd7RpcnuC
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-