General
-
Target
acf315c4cbcca9ccc61a760ba14b750815b19f02bf6abd078bb4677a3cc3b6ba
-
Size
29KB
-
Sample
221205-k7hm2aec84
-
MD5
5553c2ae4668f9447fa9a38fe2eb5cc0
-
SHA1
87b615dcc2de635648b45b8cb101bad27da821c4
-
SHA256
acf315c4cbcca9ccc61a760ba14b750815b19f02bf6abd078bb4677a3cc3b6ba
-
SHA512
a9d263a05cfcd2e6c9ea92711b821d3e2eddb53e5385466081ca98d2915611f1796f41498b00c65a0ed014bde74b914d12700976b137b02840b1bb198ae01ea4
-
SSDEEP
384:hFpQjtl7jBnoKoK3JX15nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZz/:hi7hoKoGJFNK4Aq1RehBKh0p29SgRdl
Behavioral task
behavioral1
Sample
acf315c4cbcca9ccc61a760ba14b750815b19f02bf6abd078bb4677a3cc3b6ba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
acf315c4cbcca9ccc61a760ba14b750815b19f02bf6abd078bb4677a3cc3b6ba.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
njrat
0.6.4
HacKed
127.0.0.1:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Targets
-
-
Target
acf315c4cbcca9ccc61a760ba14b750815b19f02bf6abd078bb4677a3cc3b6ba
-
Size
29KB
-
MD5
5553c2ae4668f9447fa9a38fe2eb5cc0
-
SHA1
87b615dcc2de635648b45b8cb101bad27da821c4
-
SHA256
acf315c4cbcca9ccc61a760ba14b750815b19f02bf6abd078bb4677a3cc3b6ba
-
SHA512
a9d263a05cfcd2e6c9ea92711b821d3e2eddb53e5385466081ca98d2915611f1796f41498b00c65a0ed014bde74b914d12700976b137b02840b1bb198ae01ea4
-
SSDEEP
384:hFpQjtl7jBnoKoK3JX15nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZz/:hi7hoKoGJFNK4Aq1RehBKh0p29SgRdl
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-