General
-
Target
bK7G.exe
-
Size
23KB
-
Sample
230317-ep773seb73
-
MD5
227368ebab549d28b20ce786f72320c7
-
SHA1
50f7d115ef22a2ea3d906af5e675f416ee78b5b8
-
SHA256
8c402138d923ed8e4403dd04010eaa9c593f42fc02c5fa349774c44d8dda006e
-
SHA512
9fd1d82ba2c09c23280ab00cf99790d2c66d1c4e1ebed32b6e8f5ab5f27814d95c800b18da216656b536f3f0cb1c069a29ada8ec46c6a8805e9dc2a630651f39
-
SSDEEP
384:0oWtkEwn65rgjAsGipk58D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMQ:j7O89pbrRpcnui
Behavioral task
behavioral1
Sample
bK7G.exe
Resource
win7-20230220-en
Malware Config
Extracted
njrat
0.7d
HacKed
0.tcp.ngrok.io:17506
db4fd7d140aa221059113328d0539f84
-
reg_key
db4fd7d140aa221059113328d0539f84
-
splitter
|'|'|
Targets
-
-
Target
bK7G.exe
-
Size
23KB
-
MD5
227368ebab549d28b20ce786f72320c7
-
SHA1
50f7d115ef22a2ea3d906af5e675f416ee78b5b8
-
SHA256
8c402138d923ed8e4403dd04010eaa9c593f42fc02c5fa349774c44d8dda006e
-
SHA512
9fd1d82ba2c09c23280ab00cf99790d2c66d1c4e1ebed32b6e8f5ab5f27814d95c800b18da216656b536f3f0cb1c069a29ada8ec46c6a8805e9dc2a630651f39
-
SSDEEP
384:0oWtkEwn65rgjAsGipk58D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMQ:j7O89pbrRpcnui
-
Modifies Windows Firewall
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-