General
-
Target
360feb26856fd5accc8e656c23edaf38.exe
-
Size
43KB
-
Sample
230323-fk9e1sfe6y
-
MD5
360feb26856fd5accc8e656c23edaf38
-
SHA1
1dcc19bc5f4c2bc259b40c2ba2a92e8fb35ac288
-
SHA256
3278da5825f2fa9fe2fae3a9cb16d3d8e3c47828c2258153e02567c7bc423fec
-
SHA512
75449ad3efdbad7046d2bd29c89aed435498498957e5b14f21ca928100a023acab0514c5c206c86ba9830f60e96d0222310879d23e974d057cbdfdab54b0ba9d
-
SSDEEP
384:68ZyiQt3VarE8yTH/fq5WKOEnsDay0+TzEIij+ZsNO3PlpJKkkjh/TzF7pWnB/gm:66t63MY5Tffq5hGDFuXQ/oQ3+L
Behavioral task
behavioral1
Sample
360feb26856fd5accc8e656c23edaf38.exe
Resource
win7-20230220-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
5.tcp.eu.ngrok.io:19987
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
360feb26856fd5accc8e656c23edaf38.exe
-
Size
43KB
-
MD5
360feb26856fd5accc8e656c23edaf38
-
SHA1
1dcc19bc5f4c2bc259b40c2ba2a92e8fb35ac288
-
SHA256
3278da5825f2fa9fe2fae3a9cb16d3d8e3c47828c2258153e02567c7bc423fec
-
SHA512
75449ad3efdbad7046d2bd29c89aed435498498957e5b14f21ca928100a023acab0514c5c206c86ba9830f60e96d0222310879d23e974d057cbdfdab54b0ba9d
-
SSDEEP
384:68ZyiQt3VarE8yTH/fq5WKOEnsDay0+TzEIij+ZsNO3PlpJKkkjh/TzF7pWnB/gm:66t63MY5Tffq5hGDFuXQ/oQ3+L
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-