General
-
Target
f672bd638e188015d0fd397c67a04180fa7c4b0b0f30b73ee3bc45a56b9dd678
-
Size
29KB
-
Sample
221204-r967qshg79
-
MD5
0bd945e8956e3059c9bad9289f913a60
-
SHA1
e64357f753db47030232c042a5ec1b1b539fcf78
-
SHA256
f672bd638e188015d0fd397c67a04180fa7c4b0b0f30b73ee3bc45a56b9dd678
-
SHA512
c5f99509227a61304f156b080c6caa1a5d4aab4e7dd5f0572790dbae8cb8154822d6adefe29b72c20b7847d5ddfcb12ae20ce0bbc641a0c786df8e047e0c474b
-
SSDEEP
384:CwIpl79TbsiKQ1Rz5FoQriWmqDGbLTecEGBsbh0w4wlAokw9OhgOL1vYRGOZzEp0:K7tsiKoxBr8q63TeWBKh0p29SgRcLm
Behavioral task
behavioral1
Sample
f672bd638e188015d0fd397c67a04180fa7c4b0b0f30b73ee3bc45a56b9dd678.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f672bd638e188015d0fd397c67a04180fa7c4b0b0f30b73ee3bc45a56b9dd678.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
0.6.4
تجربة
ubnt4.no-ip.biz:1177
73aa499a028d6b4821e68d9bd0b1037e
-
reg_key
73aa499a028d6b4821e68d9bd0b1037e
-
splitter
|'|'|
Targets
-
-
Target
f672bd638e188015d0fd397c67a04180fa7c4b0b0f30b73ee3bc45a56b9dd678
-
Size
29KB
-
MD5
0bd945e8956e3059c9bad9289f913a60
-
SHA1
e64357f753db47030232c042a5ec1b1b539fcf78
-
SHA256
f672bd638e188015d0fd397c67a04180fa7c4b0b0f30b73ee3bc45a56b9dd678
-
SHA512
c5f99509227a61304f156b080c6caa1a5d4aab4e7dd5f0572790dbae8cb8154822d6adefe29b72c20b7847d5ddfcb12ae20ce0bbc641a0c786df8e047e0c474b
-
SSDEEP
384:CwIpl79TbsiKQ1Rz5FoQriWmqDGbLTecEGBsbh0w4wlAokw9OhgOL1vYRGOZzEp0:K7tsiKoxBr8q63TeWBKh0p29SgRcLm
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-