General
-
Target
0ee0b78189f94c5f95f84aca68d6718554938a714157af2c939a00a5d606a7a7
-
Size
721KB
-
Sample
221126-cdkljadd72
-
MD5
7961af50b6a6802d418e02717ec1744f
-
SHA1
bea5538b4336b8443caadd0b4ebc405850982fe8
-
SHA256
0ee0b78189f94c5f95f84aca68d6718554938a714157af2c939a00a5d606a7a7
-
SHA512
d859792d648e463f77f51ea1375320adff97db4dca0c2602442329fb970651d1d8f8214e8312a0c5cb635ec62f2d59f167036d4d5dd39be64ddad977681e444c
-
SSDEEP
12288:IQ/Z6mhgZIuDBo9dn4GgLnK2hZPSggmwQLvu/K9HLPISgd/YUQYqOKopVG60r:n/ZHhzgBCd4T1LOm92YpiZqhoM
Behavioral task
behavioral1
Sample
0ee0b78189f94c5f95f84aca68d6718554938a714157af2c939a00a5d606a7a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ee0b78189f94c5f95f84aca68d6718554938a714157af2c939a00a5d606a7a7.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.7d
طلياني ذو الفقار
murtadha1233.ddns.net:3546
bbbe3c05a425e3d90a440ccd640f4d4a
-
reg_key
bbbe3c05a425e3d90a440ccd640f4d4a
-
splitter
|'|'|
Targets
-
-
Target
0ee0b78189f94c5f95f84aca68d6718554938a714157af2c939a00a5d606a7a7
-
Size
721KB
-
MD5
7961af50b6a6802d418e02717ec1744f
-
SHA1
bea5538b4336b8443caadd0b4ebc405850982fe8
-
SHA256
0ee0b78189f94c5f95f84aca68d6718554938a714157af2c939a00a5d606a7a7
-
SHA512
d859792d648e463f77f51ea1375320adff97db4dca0c2602442329fb970651d1d8f8214e8312a0c5cb635ec62f2d59f167036d4d5dd39be64ddad977681e444c
-
SSDEEP
12288:IQ/Z6mhgZIuDBo9dn4GgLnK2hZPSggmwQLvu/K9HLPISgd/YUQYqOKopVG60r:n/ZHhzgBCd4T1LOm92YpiZqhoM
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-