General
-
Target
1224-55-0x00000000003F0000-0x00000000003FC000-memory.dmp
-
Size
48KB
-
Sample
230318-lm5shabg98
-
MD5
bd208e6b7fdd8126bb9ca4156b812195
-
SHA1
02f2da34bf3b3820015a9f34a1f587acbf316d3a
-
SHA256
5b6d70ef9241d5b7916f92253c02c9d5f8b2f27601c58a843374f9fe7c7f24d9
-
SHA512
df64ba8c051442bf03520d5453b57adb7dca33d1def7389f9aacebef7551675f4dfec9002c1feb57525d523e131dea16b5cf3493041b81984a4f97d01671c507
-
SSDEEP
384:tweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZGR:SLq411eRpcnuZ
Behavioral task
behavioral1
Sample
1224-55-0x00000000003F0000-0x00000000003FC000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1224-55-0x00000000003F0000-0x00000000003FC000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
njrat
0.7d
HacKed
veprex.hopto.org:5552
83b7e568a26ebaedf41a9c3879a1e2a8
-
reg_key
83b7e568a26ebaedf41a9c3879a1e2a8
-
splitter
|'|'|
Targets
-
-
Target
1224-55-0x00000000003F0000-0x00000000003FC000-memory.dmp
-
Size
48KB
-
MD5
bd208e6b7fdd8126bb9ca4156b812195
-
SHA1
02f2da34bf3b3820015a9f34a1f587acbf316d3a
-
SHA256
5b6d70ef9241d5b7916f92253c02c9d5f8b2f27601c58a843374f9fe7c7f24d9
-
SHA512
df64ba8c051442bf03520d5453b57adb7dca33d1def7389f9aacebef7551675f4dfec9002c1feb57525d523e131dea16b5cf3493041b81984a4f97d01671c507
-
SSDEEP
384:tweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZGR:SLq411eRpcnuZ
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-