General
-
Target
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003
-
Size
29KB
-
Sample
221123-vnw2eshe64
-
MD5
75d24288b591c903d6f5d9682aafda9c
-
SHA1
b6b0a1994b9c30e12f28a420de53f1565d6a0c40
-
SHA256
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003
-
SHA512
fc07b9654f77e66860d02af6fafea165af8662b7138103c2445ed68b321b96c3dad157661fed30ed64499e7a7e10ad98fada00b46a9d48f316ef7b973da89920
-
SSDEEP
384:NhpQjtl7jBnoKoK3JX15nHK4GumRDWEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZzg:N27hoKoGJFNK4ARvRehBKh0p29SgRd6
Behavioral task
behavioral1
Sample
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.6.4
HacKed
127.0.0.1:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Targets
-
-
Target
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003
-
Size
29KB
-
MD5
75d24288b591c903d6f5d9682aafda9c
-
SHA1
b6b0a1994b9c30e12f28a420de53f1565d6a0c40
-
SHA256
4c0a6a6a08a093f5e1e0c701ce1e6b7458c161f134f7fb632404d8d1fa346003
-
SHA512
fc07b9654f77e66860d02af6fafea165af8662b7138103c2445ed68b321b96c3dad157661fed30ed64499e7a7e10ad98fada00b46a9d48f316ef7b973da89920
-
SSDEEP
384:NhpQjtl7jBnoKoK3JX15nHK4GumRDWEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZzg:N27hoKoGJFNK4ARvRehBKh0p29SgRd6
Score8/10-
Modifies Windows Firewall
-
Adds Run key to start application
-