General
-
Target
h.exe
-
Size
37KB
-
Sample
230322-redxpsbb2w
-
MD5
629c0dfd3a9b0377cfe5f04629dc6b7f
-
SHA1
c4f7e46c7d2c6ee69d0747874a3a215101931751
-
SHA256
8026b74f56f884cf8aa106f6263dafdcad5b2bd8b458578aea30cc397e0de7c1
-
SHA512
4cf763c2b324bbf06fad474816fd8452c8917066c9f5e46bb852a6bb7f3951c1d7fa9c60a874de3f2c367b20b8dd3845a00811ba6ca9c55e67fa8610fa2367af
-
SSDEEP
384:DeLx1kit8Zf5W9cTYXyc/bBM0izvncnPMIurAF+rMRTyN/0L+EcoinblneHQM3ei:CLxKjjTYic/be0PM/rM+rMRa8NuH2t
Behavioral task
behavioral1
Sample
h.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
h.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
njrat
im523
HacKed
8.tcp.ngrok.io:14795
14406cec1182ad14ed430e1c303f1c84
-
reg_key
14406cec1182ad14ed430e1c303f1c84
-
splitter
|'|'|
Targets
-
-
Target
h.exe
-
Size
37KB
-
MD5
629c0dfd3a9b0377cfe5f04629dc6b7f
-
SHA1
c4f7e46c7d2c6ee69d0747874a3a215101931751
-
SHA256
8026b74f56f884cf8aa106f6263dafdcad5b2bd8b458578aea30cc397e0de7c1
-
SHA512
4cf763c2b324bbf06fad474816fd8452c8917066c9f5e46bb852a6bb7f3951c1d7fa9c60a874de3f2c367b20b8dd3845a00811ba6ca9c55e67fa8610fa2367af
-
SSDEEP
384:DeLx1kit8Zf5W9cTYXyc/bBM0izvncnPMIurAF+rMRTyN/0L+EcoinblneHQM3ei:CLxKjjTYic/be0PM/rM+rMRa8NuH2t
Score8/10-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-