General
-
Target
5a6b12f712058e79d5ad9b2df8c1329a2507f400f83cd4617b9a29ed4e5fea46
-
Size
29KB
-
Sample
221126-kl1xgsab4t
-
MD5
a35802f39a336bee8b7fcf9fe772e730
-
SHA1
f55f71d67b97ec64e53933fc6cc5eb7e66530cd8
-
SHA256
5a6b12f712058e79d5ad9b2df8c1329a2507f400f83cd4617b9a29ed4e5fea46
-
SHA512
70d98b4672471eb6bd0be01cbb58fab178ccd9c85b43da6dd972b27ca289b71b47111cf4e79bf21283df060baaa5ea918f8371b31da4482f8a7bcf1f6c3d970c
-
SSDEEP
384:JYs5l7VL9skVQ42BkSv5dAsCGmqDm+jeI7GBsbh0w4wlAokw9OhgOL1vYRGOZzjq:57/skCXkQossqtje3BKh0p29SgR1w
Behavioral task
behavioral1
Sample
5a6b12f712058e79d5ad9b2df8c1329a2507f400f83cd4617b9a29ed4e5fea46.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5a6b12f712058e79d5ad9b2df8c1329a2507f400f83cd4617b9a29ed4e5fea46.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
0.6.4
HacKed
aziza12.no-ip.biz:1177
f26884cbd1211af8a3cd7b57fffc2aad
-
reg_key
f26884cbd1211af8a3cd7b57fffc2aad
-
splitter
|'|'|
Targets
-
-
Target
5a6b12f712058e79d5ad9b2df8c1329a2507f400f83cd4617b9a29ed4e5fea46
-
Size
29KB
-
MD5
a35802f39a336bee8b7fcf9fe772e730
-
SHA1
f55f71d67b97ec64e53933fc6cc5eb7e66530cd8
-
SHA256
5a6b12f712058e79d5ad9b2df8c1329a2507f400f83cd4617b9a29ed4e5fea46
-
SHA512
70d98b4672471eb6bd0be01cbb58fab178ccd9c85b43da6dd972b27ca289b71b47111cf4e79bf21283df060baaa5ea918f8371b31da4482f8a7bcf1f6c3d970c
-
SSDEEP
384:JYs5l7VL9skVQ42BkSv5dAsCGmqDm+jeI7GBsbh0w4wlAokw9OhgOL1vYRGOZzjq:57/skCXkQossqtje3BKh0p29SgR1w
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-