General
-
Target
8dd2265487197ab2b2f16c99125a601a3f017a95b0e19f752051fe189a29f17c
-
Size
23KB
-
Sample
221124-2cb1fagc3x
-
MD5
32f2552072f676c1e6f015d2f7304f23
-
SHA1
0bc9defa91e27b066dd7c5f12b2e5b8ebedc8946
-
SHA256
8dd2265487197ab2b2f16c99125a601a3f017a95b0e19f752051fe189a29f17c
-
SHA512
3b7d1942daec9e5101ac7b045e2e999650d5a6ad863af62c7fcdfd408164351758e5abc8b334a536c6f5254dda44097c5c67914e44dc0685275bf636631139ea
-
SSDEEP
384:a0jeCIYTNQZUuQnJXJeCXlwhPQ6VgDOwBHhdmRvR6JZlbw8hqIusZzZpFGrFM:F3jNAU/ZVX6Rpcnuk2e
Behavioral task
behavioral1
Sample
8dd2265487197ab2b2f16c99125a601a3f017a95b0e19f752051fe189a29f17c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8dd2265487197ab2b2f16c99125a601a3f017a95b0e19f752051fe189a29f17c.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
0.7d
HacKed by parosh
parosh22.ddns.net:1177
e4995e55c0970b64807d63edc8a971a5
-
reg_key
e4995e55c0970b64807d63edc8a971a5
-
splitter
|'|'|
Targets
-
-
Target
8dd2265487197ab2b2f16c99125a601a3f017a95b0e19f752051fe189a29f17c
-
Size
23KB
-
MD5
32f2552072f676c1e6f015d2f7304f23
-
SHA1
0bc9defa91e27b066dd7c5f12b2e5b8ebedc8946
-
SHA256
8dd2265487197ab2b2f16c99125a601a3f017a95b0e19f752051fe189a29f17c
-
SHA512
3b7d1942daec9e5101ac7b045e2e999650d5a6ad863af62c7fcdfd408164351758e5abc8b334a536c6f5254dda44097c5c67914e44dc0685275bf636631139ea
-
SSDEEP
384:a0jeCIYTNQZUuQnJXJeCXlwhPQ6VgDOwBHhdmRvR6JZlbw8hqIusZzZpFGrFM:F3jNAU/ZVX6Rpcnuk2e
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-