General
-
Target
2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa
-
Size
356KB
-
Sample
221126-2mqataeb5x
-
MD5
779f561dc93adbf2b40e92ac374f7cf5
-
SHA1
562ca1be06ff75f55893fa5472abbf7bb9fa6625
-
SHA256
2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa
-
SHA512
d1a3f889c6f60b49d07519ddc73f9108012c8e4b81a01328ac75400bd10888428fed84c81a32da3ff00644e3149ba8ad4fd9720d2bb4c0819619e9f9f2069501
-
SSDEEP
6144:9LM3L6hWtnvqI6vzkGTxapOEBqa5tXc8s:hMbaWtn6vzkYmVjC8s
Static task
static1
Behavioral task
behavioral1
Sample
2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
0.7d
FBautoliker103
182.191.88.102:5555
246bc91174535f2c90a8931dec64f396
-
reg_key
246bc91174535f2c90a8931dec64f396
-
splitter
|'|'|
Targets
-
-
Target
2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa
-
Size
356KB
-
MD5
779f561dc93adbf2b40e92ac374f7cf5
-
SHA1
562ca1be06ff75f55893fa5472abbf7bb9fa6625
-
SHA256
2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa
-
SHA512
d1a3f889c6f60b49d07519ddc73f9108012c8e4b81a01328ac75400bd10888428fed84c81a32da3ff00644e3149ba8ad4fd9720d2bb4c0819619e9f9f2069501
-
SSDEEP
6144:9LM3L6hWtnvqI6vzkGTxapOEBqa5tXc8s:hMbaWtn6vzkYmVjC8s
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-