General
-
Target
f5c98664c8edee079c19b854622493cd3ce7bb89904986c339e378a045b9fbe8
-
Size
439KB
-
Sample
221127-mz1jzsbf59
-
MD5
53f7914b4ad0114be2205b5f2feff8b3
-
SHA1
b66b6323b8cebd89ff5db2698ebeb76bbafaf4c6
-
SHA256
f5c98664c8edee079c19b854622493cd3ce7bb89904986c339e378a045b9fbe8
-
SHA512
b50d9f85a7ea3939bbae5424c1558784a032ccceee8f58c3a7f0d65da1d634e171b200499006ed6ae4f3ec1218a223b01c7be2b165a3e79aa345b9d45319ae21
-
SSDEEP
6144:KOraF0ipFssZt57/yd3tFnruc/wInL5OZpKYSfRdZYO/5RfKKC70T:nulXxveddp3nL5fp3ZpLVC7
Static task
static1
Behavioral task
behavioral1
Sample
f5c98664c8edee079c19b854622493cd3ce7bb89904986c339e378a045b9fbe8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5c98664c8edee079c19b854622493cd3ce7bb89904986c339e378a045b9fbe8.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
njrat
0.6.4
HacKed
motaga8.no-ip.biz:1177
ecc7c8c51c0850c1ec247c7fd3602f20
-
reg_key
ecc7c8c51c0850c1ec247c7fd3602f20
-
splitter
|'|'|
Targets
-
-
Target
f5c98664c8edee079c19b854622493cd3ce7bb89904986c339e378a045b9fbe8
-
Size
439KB
-
MD5
53f7914b4ad0114be2205b5f2feff8b3
-
SHA1
b66b6323b8cebd89ff5db2698ebeb76bbafaf4c6
-
SHA256
f5c98664c8edee079c19b854622493cd3ce7bb89904986c339e378a045b9fbe8
-
SHA512
b50d9f85a7ea3939bbae5424c1558784a032ccceee8f58c3a7f0d65da1d634e171b200499006ed6ae4f3ec1218a223b01c7be2b165a3e79aa345b9d45319ae21
-
SSDEEP
6144:KOraF0ipFssZt57/yd3tFnruc/wInL5OZpKYSfRdZYO/5RfKKC70T:nulXxveddp3nL5fp3ZpLVC7
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-