General
-
Target
6f3e8e9f1acfd2158ff7970fe7bbd230f6e2a20c18257844c1da287cfc3d35dc
-
Size
220KB
-
Sample
221125-jjvf9abf49
-
MD5
df25c6e036086ae50b311bc32fd64691
-
SHA1
ac7611fee3fa865e8b6776e513b343992956767e
-
SHA256
6f3e8e9f1acfd2158ff7970fe7bbd230f6e2a20c18257844c1da287cfc3d35dc
-
SHA512
51ed24ede16b072cda33e764c6e109c85234af6957cde82bf58d44d41021d01b26b4e69d44e5110513f3f38398b710980dad4a0b4b5ebffcc4f39d59ceaaa281
-
SSDEEP
3072:tcwb029dgZ/pRj7QbAbPF5EuOU8EStx/y9dwF0rYMbZUU1pupjyQwUr6Bx4hR4d:Hn6pR/kKPrEuSb/y9d1sRpjyQX1hR2
Behavioral task
behavioral1
Sample
6f3e8e9f1acfd2158ff7970fe7bbd230f6e2a20c18257844c1da287cfc3d35dc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f3e8e9f1acfd2158ff7970fe7bbd230f6e2a20c18257844c1da287cfc3d35dc.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.7d
HacKed
alpha-7.no-ip.biz:5552
f3b4549e9273b6cf9b3f02a2ce32bfa0
-
reg_key
f3b4549e9273b6cf9b3f02a2ce32bfa0
-
splitter
|'|'|
Targets
-
-
Target
6f3e8e9f1acfd2158ff7970fe7bbd230f6e2a20c18257844c1da287cfc3d35dc
-
Size
220KB
-
MD5
df25c6e036086ae50b311bc32fd64691
-
SHA1
ac7611fee3fa865e8b6776e513b343992956767e
-
SHA256
6f3e8e9f1acfd2158ff7970fe7bbd230f6e2a20c18257844c1da287cfc3d35dc
-
SHA512
51ed24ede16b072cda33e764c6e109c85234af6957cde82bf58d44d41021d01b26b4e69d44e5110513f3f38398b710980dad4a0b4b5ebffcc4f39d59ceaaa281
-
SSDEEP
3072:tcwb029dgZ/pRj7QbAbPF5EuOU8EStx/y9dwF0rYMbZUU1pupjyQwUr6Bx4hR4d:Hn6pR/kKPrEuSb/y9d1sRpjyQX1hR2
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-