General
-
Target
1294b2f4d7e36330ed22a7332963d614127473fcfcae8cba16e42dabfbb3eb42
-
Size
440KB
-
Sample
221126-2byg2sdc6w
-
MD5
c4685f33c8dbb6aa3fbdcb4f1d7d4aac
-
SHA1
f6a75a55beedf019fdc23c65cefce1b3e829bc9a
-
SHA256
1294b2f4d7e36330ed22a7332963d614127473fcfcae8cba16e42dabfbb3eb42
-
SHA512
78bd77b5c9646406fb3a12ee0ad93bb44a5c8dd7d5c07415d7a22528c68b55e7c70b6b7dac6f92370fe715f03ec61529e55e9278c2ffc2a7f13eb5512afaa056
-
SSDEEP
12288:RtztJcg9EmcjJowktoOAbE928urH+DjBAjnL/:nztJ1kzk+bJ8urePBAjnL
Static task
static1
Behavioral task
behavioral1
Sample
1294b2f4d7e36330ed22a7332963d614127473fcfcae8cba16e42dabfbb3eb42.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1294b2f4d7e36330ed22a7332963d614127473fcfcae8cba16e42dabfbb3eb42.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
0.7d
HacKed
ko0zo.ddns.net:1177
a0e636024fac314e8f41b1a79965670d
-
reg_key
a0e636024fac314e8f41b1a79965670d
-
splitter
|'|'|
Targets
-
-
Target
1294b2f4d7e36330ed22a7332963d614127473fcfcae8cba16e42dabfbb3eb42
-
Size
440KB
-
MD5
c4685f33c8dbb6aa3fbdcb4f1d7d4aac
-
SHA1
f6a75a55beedf019fdc23c65cefce1b3e829bc9a
-
SHA256
1294b2f4d7e36330ed22a7332963d614127473fcfcae8cba16e42dabfbb3eb42
-
SHA512
78bd77b5c9646406fb3a12ee0ad93bb44a5c8dd7d5c07415d7a22528c68b55e7c70b6b7dac6f92370fe715f03ec61529e55e9278c2ffc2a7f13eb5512afaa056
-
SSDEEP
12288:RtztJcg9EmcjJowktoOAbE928urH+DjBAjnL/:nztJ1kzk+bJ8urePBAjnL
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-