General
-
Target
bK7F.exe
-
Size
23KB
-
Sample
230317-fsjvbsgd5x
-
MD5
59645ca85405fac3881899a293149272
-
SHA1
a6fe815e16b0f0dbec37b553ec1d7ff4ac97f08f
-
SHA256
546d7be50a9f2e5172fe46d3e20031f8d743d1f1cca29a432dfa3df9d109e292
-
SHA512
ea3ff11fcad38c916a0b7c5266f9eaa69ff0d8bd36e9b1a768b407a70b32460d3d80e1b068c82e3981a6fb399a8fac02b2b914493df5ad7900627d6b27ee62e1
-
SSDEEP
384:3oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMo:Q7O89p2rRpcnu6
Behavioral task
behavioral1
Sample
bK7F.exe
Resource
win7-20230220-en
Malware Config
Extracted
njrat
0.7d
HacKed
0.tcp.ngrok.io:17506
db4fd7d140aa221059113328d0539f84
-
reg_key
db4fd7d140aa221059113328d0539f84
-
splitter
|'|'|
Targets
-
-
Target
bK7F.exe
-
Size
23KB
-
MD5
59645ca85405fac3881899a293149272
-
SHA1
a6fe815e16b0f0dbec37b553ec1d7ff4ac97f08f
-
SHA256
546d7be50a9f2e5172fe46d3e20031f8d743d1f1cca29a432dfa3df9d109e292
-
SHA512
ea3ff11fcad38c916a0b7c5266f9eaa69ff0d8bd36e9b1a768b407a70b32460d3d80e1b068c82e3981a6fb399a8fac02b2b914493df5ad7900627d6b27ee62e1
-
SSDEEP
384:3oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZMo:Q7O89p2rRpcnu6
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-