General
-
Target
86d7f04ec8f14bc99e001e9ca5b75abb.exe
-
Size
37KB
-
Sample
230306-fnjnrsac6s
-
MD5
86d7f04ec8f14bc99e001e9ca5b75abb
-
SHA1
ca0606ac2901a5c6cc35b0a12e7402a72809b672
-
SHA256
f7bfca7c1468028954af44d86b94c182211f73942034e628d28046969dfce169
-
SHA512
6137e78261cbb939551299f6775c7fc395b89a54ae23a863ea884fe9de7c08849a9f85c60e6f115ec5db7bbc1f246607f406874e8ae6c5418cd854dc630a5a3c
-
SSDEEP
384:NjcUFaik6qQ+gYNiycTTaHNWcWyHSrAF+rMRTyN/0L+EcoinblneHQM3epzXZNrH:9c+kNxcTTaAdyyrM+rMRa8NuHDt
Behavioral task
behavioral1
Sample
86d7f04ec8f14bc99e001e9ca5b75abb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
86d7f04ec8f14bc99e001e9ca5b75abb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
njrat
im523
defender
0.tcp.eu.ngrok.io:10776
2f9ce2d0a9523e2eb3944aff5d6e9a8c
-
reg_key
2f9ce2d0a9523e2eb3944aff5d6e9a8c
-
splitter
|'|'|
Targets
-
-
Target
86d7f04ec8f14bc99e001e9ca5b75abb.exe
-
Size
37KB
-
MD5
86d7f04ec8f14bc99e001e9ca5b75abb
-
SHA1
ca0606ac2901a5c6cc35b0a12e7402a72809b672
-
SHA256
f7bfca7c1468028954af44d86b94c182211f73942034e628d28046969dfce169
-
SHA512
6137e78261cbb939551299f6775c7fc395b89a54ae23a863ea884fe9de7c08849a9f85c60e6f115ec5db7bbc1f246607f406874e8ae6c5418cd854dc630a5a3c
-
SSDEEP
384:NjcUFaik6qQ+gYNiycTTaHNWcWyHSrAF+rMRTyN/0L+EcoinblneHQM3epzXZNrH:9c+kNxcTTaAdyyrM+rMRa8NuHDt
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-