General
-
Target
bccab244b62b373fa363a3507e00c41c6abc133093f4f072961e2a00e20cfb93
-
Size
29KB
-
Sample
221124-ezxjbsgh55
-
MD5
3ba3b7dc5a2402d25e8d397679d111ae
-
SHA1
1fa0426ba293720c8c12e2509b115b8d71bcc947
-
SHA256
bccab244b62b373fa363a3507e00c41c6abc133093f4f072961e2a00e20cfb93
-
SHA512
b8bcdb0e53f93f6fdf22eda27ab92d69c47bb9d08361091541200032e90e4cbe8d0f686ee8c5b4c6006c7fd3e0d8dd5e8e65bcebd43b9bbdd7035f38f2f0cf40
-
SSDEEP
384:M4J55l71rzsqiYtBL591rCGmqDGzjeP0GBsbh0w4wlAokw9OhgOL1vYRGOZzpZYb:Z7FsqiIpdrsqUjevBKh0p29SgRTY
Behavioral task
behavioral1
Sample
bccab244b62b373fa363a3507e00c41c6abc133093f4f072961e2a00e20cfb93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bccab244b62b373fa363a3507e00c41c6abc133093f4f072961e2a00e20cfb93.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
0.6.4
Prince Muhammed
iammuhammed.noip.me:1177
ba4c12bee3027d94da5c81db2d196bfd
-
reg_key
ba4c12bee3027d94da5c81db2d196bfd
-
splitter
|'|'|
Targets
-
-
Target
bccab244b62b373fa363a3507e00c41c6abc133093f4f072961e2a00e20cfb93
-
Size
29KB
-
MD5
3ba3b7dc5a2402d25e8d397679d111ae
-
SHA1
1fa0426ba293720c8c12e2509b115b8d71bcc947
-
SHA256
bccab244b62b373fa363a3507e00c41c6abc133093f4f072961e2a00e20cfb93
-
SHA512
b8bcdb0e53f93f6fdf22eda27ab92d69c47bb9d08361091541200032e90e4cbe8d0f686ee8c5b4c6006c7fd3e0d8dd5e8e65bcebd43b9bbdd7035f38f2f0cf40
-
SSDEEP
384:M4J55l71rzsqiYtBL591rCGmqDGzjeP0GBsbh0w4wlAokw9OhgOL1vYRGOZzpZYb:Z7FsqiIpdrsqUjevBKh0p29SgRTY
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-