General
-
Target
867221a4c1c00e733b15f734bf130761.exe
-
Size
23KB
-
Sample
230306-fa4f1saf77
-
MD5
867221a4c1c00e733b15f734bf130761
-
SHA1
e054be2b6c4b7a6f64e55e0fe54b08f8412eff61
-
SHA256
a07af404a9e454c51722e9e624b97391fd619e1d3e456e607df1ce144f544fcd
-
SHA512
d0823504d05f4377dccf15196e2a10b57e7c08531bebefb83e36aa0fc840b5c27c1f8415ada8fc7c8e27e7a143509a2830f6d78bab56d51070bf4adb5d96da59
-
SSDEEP
384:6luBPiZCMfdfSJrQbsLRGSIxYVL46fg/i8BD9BmRvR6JZlbw8hqIusZzZnz:tOmhtIURpcnug
Behavioral task
behavioral1
Sample
867221a4c1c00e733b15f734bf130761.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
867221a4c1c00e733b15f734bf130761.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
njrat
0.7d
Lammer
0.tcp.sa.ngrok.io:13305
fb63fa16c0ef2581dd6e4485796787cc
-
reg_key
fb63fa16c0ef2581dd6e4485796787cc
-
splitter
|'|'|
Targets
-
-
Target
867221a4c1c00e733b15f734bf130761.exe
-
Size
23KB
-
MD5
867221a4c1c00e733b15f734bf130761
-
SHA1
e054be2b6c4b7a6f64e55e0fe54b08f8412eff61
-
SHA256
a07af404a9e454c51722e9e624b97391fd619e1d3e456e607df1ce144f544fcd
-
SHA512
d0823504d05f4377dccf15196e2a10b57e7c08531bebefb83e36aa0fc840b5c27c1f8415ada8fc7c8e27e7a143509a2830f6d78bab56d51070bf4adb5d96da59
-
SSDEEP
384:6luBPiZCMfdfSJrQbsLRGSIxYVL46fg/i8BD9BmRvR6JZlbw8hqIusZzZnz:tOmhtIURpcnug
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-