General
-
Target
203908fecf76e8f5b21ffb093cf2347eaf235fa2212e44bb023c9ee73ae6710b
-
Size
23KB
-
Sample
221126-kmv3mafb69
-
MD5
ab076fa27a284d29152b8273a82b95b4
-
SHA1
4bfa210f44c47050b0ff92ca7c76a4225edb9150
-
SHA256
203908fecf76e8f5b21ffb093cf2347eaf235fa2212e44bb023c9ee73ae6710b
-
SHA512
38940c5510fd4169057f5dfa3e54eef7683649a8cb84794772562317d8d947e9a6a16d781b79262eff6d3f408ac008b05767fe8354da100c9dedb0b4fde9609f
-
SSDEEP
384:ScqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZYqA:F30py6vhxaRpcnuHb
Behavioral task
behavioral1
Sample
203908fecf76e8f5b21ffb093cf2347eaf235fa2212e44bb023c9ee73ae6710b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
203908fecf76e8f5b21ffb093cf2347eaf235fa2212e44bb023c9ee73ae6710b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.7d
Bot
smuktnet.ddns.net:5552
ae4562ec1d4d0afd82039ca2517bd6df
-
reg_key
ae4562ec1d4d0afd82039ca2517bd6df
-
splitter
|'|'|
Targets
-
-
Target
203908fecf76e8f5b21ffb093cf2347eaf235fa2212e44bb023c9ee73ae6710b
-
Size
23KB
-
MD5
ab076fa27a284d29152b8273a82b95b4
-
SHA1
4bfa210f44c47050b0ff92ca7c76a4225edb9150
-
SHA256
203908fecf76e8f5b21ffb093cf2347eaf235fa2212e44bb023c9ee73ae6710b
-
SHA512
38940c5510fd4169057f5dfa3e54eef7683649a8cb84794772562317d8d947e9a6a16d781b79262eff6d3f408ac008b05767fe8354da100c9dedb0b4fde9609f
-
SSDEEP
384:ScqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZYqA:F30py6vhxaRpcnuHb
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-