General
-
Target
81e7eb62a140d6fa89d9c15748789aa29b2f428fc7fce15fee9159ca3a53b82b
-
Size
715KB
-
Sample
221126-2l5dcaeb2x
-
MD5
df265fe540eaf09ba00fa6fa29af3624
-
SHA1
2ab46e8c20481068f15291ef31356bca50b2ecb7
-
SHA256
81e7eb62a140d6fa89d9c15748789aa29b2f428fc7fce15fee9159ca3a53b82b
-
SHA512
7fd35a660fabedb84a1e2dd412252718b211cf3f6c371f40456b37906bd22478d318041cc66d56d081f050fd915d50ee9d6c27e87f7745b12f4213636b55a4ec
-
SSDEEP
12288:+H7Wcjdc/r2sxxiPGGAOOPSXDV8ClgVYhX5FSsf8QU3NELIHIYwE4HVA:+bCj2sObHtqQ4QSTwt1A
Static task
static1
Behavioral task
behavioral1
Sample
81e7eb62a140d6fa89d9c15748789aa29b2f428fc7fce15fee9159ca3a53b82b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
81e7eb62a140d6fa89d9c15748789aa29b2f428fc7fce15fee9159ca3a53b82b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.6.4
HacKed
5.34.183.64:1699
2814667a3ff5b067280784d8be595983
-
reg_key
2814667a3ff5b067280784d8be595983
-
splitter
|'|'|
Targets
-
-
Target
81e7eb62a140d6fa89d9c15748789aa29b2f428fc7fce15fee9159ca3a53b82b
-
Size
715KB
-
MD5
df265fe540eaf09ba00fa6fa29af3624
-
SHA1
2ab46e8c20481068f15291ef31356bca50b2ecb7
-
SHA256
81e7eb62a140d6fa89d9c15748789aa29b2f428fc7fce15fee9159ca3a53b82b
-
SHA512
7fd35a660fabedb84a1e2dd412252718b211cf3f6c371f40456b37906bd22478d318041cc66d56d081f050fd915d50ee9d6c27e87f7745b12f4213636b55a4ec
-
SSDEEP
12288:+H7Wcjdc/r2sxxiPGGAOOPSXDV8ClgVYhX5FSsf8QU3NELIHIYwE4HVA:+bCj2sObHtqQ4QSTwt1A
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-