General
-
Target
1cc1c1281b0adbcd8d4ab94e2b4f3083a3dc7455e3e49cd19cd460185b3885d3
-
Size
23KB
-
Sample
221127-t3139aca37
-
MD5
9e718fd98508a1e92592ab67b9e12377
-
SHA1
62df73b0a63959e1c0baf7af58cbeff4a1e2860a
-
SHA256
1cc1c1281b0adbcd8d4ab94e2b4f3083a3dc7455e3e49cd19cd460185b3885d3
-
SHA512
4b67d5e7104956154e889fc06353286a8c78365c29f225df81e9081a6afa77ad3237a9e473561a34c02029d199b80eb6512c2cd961b235ce81d6d439d44a9b2e
-
SSDEEP
384:fST2x0W3qZN2ATtRGCfCo9D46BgnqUhL1ZmRvR6JZlbw8hqIusZzZmK:fth+rdfpRpcnuC
Behavioral task
behavioral1
Sample
1cc1c1281b0adbcd8d4ab94e2b4f3083a3dc7455e3e49cd19cd460185b3885d3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1cc1c1281b0adbcd8d4ab94e2b4f3083a3dc7455e3e49cd19cd460185b3885d3.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
njrat
0.7d
HacKed By Omar Mora
mora333.ddns.net:5552
2b29df679f5c6b293763f5b4e411b491
-
reg_key
2b29df679f5c6b293763f5b4e411b491
-
splitter
|'|'|
Targets
-
-
Target
1cc1c1281b0adbcd8d4ab94e2b4f3083a3dc7455e3e49cd19cd460185b3885d3
-
Size
23KB
-
MD5
9e718fd98508a1e92592ab67b9e12377
-
SHA1
62df73b0a63959e1c0baf7af58cbeff4a1e2860a
-
SHA256
1cc1c1281b0adbcd8d4ab94e2b4f3083a3dc7455e3e49cd19cd460185b3885d3
-
SHA512
4b67d5e7104956154e889fc06353286a8c78365c29f225df81e9081a6afa77ad3237a9e473561a34c02029d199b80eb6512c2cd961b235ce81d6d439d44a9b2e
-
SSDEEP
384:fST2x0W3qZN2ATtRGCfCo9D46BgnqUhL1ZmRvR6JZlbw8hqIusZzZmK:fth+rdfpRpcnuC
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-