General
-
Target
78670d5a183c2679c8c45c323c23a4c8ca750360a03fb76e1a2923dfca439433
-
Size
23KB
-
Sample
221125-jgnkxsbd86
-
MD5
4365a0d1044bc78fa41fd4191678efe5
-
SHA1
dfac2a71df39d25541322e6474c347ef38c9c438
-
SHA256
78670d5a183c2679c8c45c323c23a4c8ca750360a03fb76e1a2923dfca439433
-
SHA512
17993143727707b8fd450e2c5065f5221bc70364ae1cdf6e0e2052a5fae7a4a84429084088e1ff6600815c9a482a69bd0411ec3dc338ab0cd38eb18b222069db
-
SSDEEP
384:k8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZxR:jXcwt3tRpcnuI
Behavioral task
behavioral1
Sample
78670d5a183c2679c8c45c323c23a4c8ca750360a03fb76e1a2923dfca439433.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78670d5a183c2679c8c45c323c23a4c8ca750360a03fb76e1a2923dfca439433.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.7d
dinaro
barby.no-ip.biz:1177
be38e079e21e7a803483d18fb29a86c3
-
reg_key
be38e079e21e7a803483d18fb29a86c3
-
splitter
|'|'|
Targets
-
-
Target
78670d5a183c2679c8c45c323c23a4c8ca750360a03fb76e1a2923dfca439433
-
Size
23KB
-
MD5
4365a0d1044bc78fa41fd4191678efe5
-
SHA1
dfac2a71df39d25541322e6474c347ef38c9c438
-
SHA256
78670d5a183c2679c8c45c323c23a4c8ca750360a03fb76e1a2923dfca439433
-
SHA512
17993143727707b8fd450e2c5065f5221bc70364ae1cdf6e0e2052a5fae7a4a84429084088e1ff6600815c9a482a69bd0411ec3dc338ab0cd38eb18b222069db
-
SSDEEP
384:k8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZxR:jXcwt3tRpcnuI
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-