General
-
Target
6239834a0e304149f87467947df4575fc775733d81caa5fe048d9f99d8db298a
-
Size
37KB
-
Sample
221130-rwh8racb3z
-
MD5
a11c07b41dceb5d7cbb10c857b0fe48c
-
SHA1
fa438d9f035df2d11d0a485006c99b3939b48eb1
-
SHA256
6239834a0e304149f87467947df4575fc775733d81caa5fe048d9f99d8db298a
-
SHA512
cdadb362cb71d638063cd47a2b2979b9a53368c15f2df63c5b53e713efb66938ee5acf325e84c933619e5ff0b6574a92b39a6568d297d8ba74b60546a47a2554
-
SSDEEP
384:IJXzkit6Zf5W9cTYXyc/xDMiwzXhqn/KVFrAF+rMRTyN/0L+EcoinblneHQM3ep:yXSjjTYic/xw8/KnrM+rMRa8NuIPt
Behavioral task
behavioral1
Sample
6239834a0e304149f87467947df4575fc775733d81caa5fe048d9f99d8db298a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6239834a0e304149f87467947df4575fc775733d81caa5fe048d9f99d8db298a.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
im523
hacker
hacker228.ddns.net:7777
d65b7ae301f2c83d267d8f3480777d2e
-
reg_key
d65b7ae301f2c83d267d8f3480777d2e
-
splitter
|'|'|
Targets
-
-
Target
6239834a0e304149f87467947df4575fc775733d81caa5fe048d9f99d8db298a
-
Size
37KB
-
MD5
a11c07b41dceb5d7cbb10c857b0fe48c
-
SHA1
fa438d9f035df2d11d0a485006c99b3939b48eb1
-
SHA256
6239834a0e304149f87467947df4575fc775733d81caa5fe048d9f99d8db298a
-
SHA512
cdadb362cb71d638063cd47a2b2979b9a53368c15f2df63c5b53e713efb66938ee5acf325e84c933619e5ff0b6574a92b39a6568d297d8ba74b60546a47a2554
-
SSDEEP
384:IJXzkit6Zf5W9cTYXyc/xDMiwzXhqn/KVFrAF+rMRTyN/0L+EcoinblneHQM3ep:yXSjjTYic/xw8/KnrM+rMRa8NuIPt
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-