General
-
Target
d1742aefc94c12b6a3b54abc9536d7876d61809e0275d4e3a977571de4a3b5ba
-
Size
29KB
-
Sample
221125-zr8xlshe3x
-
MD5
f1bc51554d061e253ee70be76d5257c7
-
SHA1
f21ed970c458f71476566b64acfa9939d8bad6f4
-
SHA256
d1742aefc94c12b6a3b54abc9536d7876d61809e0275d4e3a977571de4a3b5ba
-
SHA512
67d2542f34fb81d2eaa490d625542f8ed3aa74e5f2acbf0a1fddf4e8d6a0734fb9f3f1f78f7a87ef456d47125db9113b1e839b7e02788edf92da7ba899c83074
-
SSDEEP
384:bhQXpl7dzns8oDw/LRP55/4GWmqDSeXegLGBsbh0w4wlAokw9OhgOL1vYRGOZzZ1:bE7Js8oDSJz4wqZXenBKh0p29SgRec
Behavioral task
behavioral1
Sample
d1742aefc94c12b6a3b54abc9536d7876d61809e0275d4e3a977571de4a3b5ba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d1742aefc94c12b6a3b54abc9536d7876d61809e0275d4e3a977571de4a3b5ba.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.6.4
HacKed
lovesafa.no-ip.biz:1177
e79d569ba77562f0d4316e586835f0a2
-
reg_key
e79d569ba77562f0d4316e586835f0a2
-
splitter
|'|'|
Targets
-
-
Target
d1742aefc94c12b6a3b54abc9536d7876d61809e0275d4e3a977571de4a3b5ba
-
Size
29KB
-
MD5
f1bc51554d061e253ee70be76d5257c7
-
SHA1
f21ed970c458f71476566b64acfa9939d8bad6f4
-
SHA256
d1742aefc94c12b6a3b54abc9536d7876d61809e0275d4e3a977571de4a3b5ba
-
SHA512
67d2542f34fb81d2eaa490d625542f8ed3aa74e5f2acbf0a1fddf4e8d6a0734fb9f3f1f78f7a87ef456d47125db9113b1e839b7e02788edf92da7ba899c83074
-
SSDEEP
384:bhQXpl7dzns8oDw/LRP55/4GWmqDSeXegLGBsbh0w4wlAokw9OhgOL1vYRGOZzZ1:bE7Js8oDSJz4wqZXenBKh0p29SgRec
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-