General
-
Target
0f7cc6d0db24a3232849b92cc1822a0e131511af92e057e675855610ff1e6b55
-
Size
139KB
-
Sample
221126-cdg6eadd66
-
MD5
776f742cd640743feaaa39b4b27ad12c
-
SHA1
84dc74a54cc278387943aa2900f746e1f7f3ea30
-
SHA256
0f7cc6d0db24a3232849b92cc1822a0e131511af92e057e675855610ff1e6b55
-
SHA512
c7fa1db3539373ad2df413a1309b8b02e4a156e57580892364e24a771fc55a9f968a844cd2d343fcf112e1131aa84e4ce2ab8f77aaae7d21bb440cde02904098
-
SSDEEP
3072:wbR4hxLB88ANRvvE7pjYFoqphjsjwoHlppHGtveYVywoE:5h1BQNRvvE7pjYFoqphjsjwoHlppH4px
Behavioral task
behavioral1
Sample
0f7cc6d0db24a3232849b92cc1822a0e131511af92e057e675855610ff1e6b55.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0f7cc6d0db24a3232849b92cc1822a0e131511af92e057e675855610ff1e6b55.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:1177
12d9c0ae3adc99cd1abd645642722abc
-
reg_key
12d9c0ae3adc99cd1abd645642722abc
-
splitter
|'|'|
Targets
-
-
Target
0f7cc6d0db24a3232849b92cc1822a0e131511af92e057e675855610ff1e6b55
-
Size
139KB
-
MD5
776f742cd640743feaaa39b4b27ad12c
-
SHA1
84dc74a54cc278387943aa2900f746e1f7f3ea30
-
SHA256
0f7cc6d0db24a3232849b92cc1822a0e131511af92e057e675855610ff1e6b55
-
SHA512
c7fa1db3539373ad2df413a1309b8b02e4a156e57580892364e24a771fc55a9f968a844cd2d343fcf112e1131aa84e4ce2ab8f77aaae7d21bb440cde02904098
-
SSDEEP
3072:wbR4hxLB88ANRvvE7pjYFoqphjsjwoHlppHGtveYVywoE:5h1BQNRvvE7pjYFoqphjsjwoHlppH4px
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-