General
-
Target
DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe
-
Size
451KB
-
Sample
230321-en3wzagg29
-
MD5
8eb05c68a5880d8f15fa787b02192709
-
SHA1
45813931de14ac2f4f66d412caf9cf6fd236c5c5
-
SHA256
df15669f7f948abd95d1a4c326aa0443f0cc534513b253accff8bd2549a3f3dc
-
SHA512
231d122c647684386399ebe117189f1d784f89ae127fb41a061b6d43bec94c7d9cda0f13b6a4ad7f1ad233177f9df43a11c6040180653bf592ee39d3e74708b3
-
SSDEEP
12288:BjKiWwykMpBMs3qLVmNwCIWaONK6ezkf4BBe/wKA3JIOb2:Bj5bMpf6L2wzWnW38zA3Zi
Static task
static1
Behavioral task
behavioral1
Sample
DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
https://files.catbox.moe/hw5nal.jpg
Extracted
njrat
0.7d
ofiss
ofi.dyn.ydns.io:5553
cde55e52fb830e966551ebb867b911f6
-
reg_key
cde55e52fb830e966551ebb867b911f6
-
splitter
|'|'|
Extracted
wshrat
http://ofi.dyn.ydns.io:8000
Targets
-
-
Target
DF15669F7F948ABD95D1A4C326AA0443F0CC534513B25.exe
-
Size
451KB
-
MD5
8eb05c68a5880d8f15fa787b02192709
-
SHA1
45813931de14ac2f4f66d412caf9cf6fd236c5c5
-
SHA256
df15669f7f948abd95d1a4c326aa0443f0cc534513b253accff8bd2549a3f3dc
-
SHA512
231d122c647684386399ebe117189f1d784f89ae127fb41a061b6d43bec94c7d9cda0f13b6a4ad7f1ad233177f9df43a11c6040180653bf592ee39d3e74708b3
-
SSDEEP
12288:BjKiWwykMpBMs3qLVmNwCIWaONK6ezkf4BBe/wKA3JIOb2:Bj5bMpf6L2wzWnW38zA3Zi
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-