General
-
Target
043e344c6cc9477cbcfc0a483b1ca568.bin
-
Size
11KB
-
Sample
230326-bdgdfaeh63
-
MD5
114a70e6aecf729cb4110f2bf271b1bd
-
SHA1
0da9fa11378a4c4bcd0c2e03a7d277e0498d343e
-
SHA256
bcaed85335595e6774d3787aec232b7468c68095f0de5a14e5f7364b6ca2cf7e
-
SHA512
98a975c8d98de39525dcef8138b72e0e5cdf0a00467bdfa46b6b574e29839542ca05abd835d15f1441da42fc4305b7711b87d1c35ed106abe9839bbaacaab15a
-
SSDEEP
192:1Hvkg2Bc9GwP4No0s52eUIDaHTXHZaP8sbhImANt6E4udSJKxNYpxYtsFiBft:Ncg2Bc9rP4Nfo2e1GT5ajdGUQdSAQ8nt
Behavioral task
behavioral1
Sample
424f837c55e7216646a63f6bbbbba766ed7521273ddfce6edad4b6335bf7a36e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
424f837c55e7216646a63f6bbbbba766ed7521273ddfce6edad4b6335bf7a36e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
njrat
0.7d
plug-in
0.tcp.ap.ngrok.io:10881
6ca646ee7571a205268803e929e9d247
-
reg_key
6ca646ee7571a205268803e929e9d247
-
splitter
|'|'|
Targets
-
-
Target
424f837c55e7216646a63f6bbbbba766ed7521273ddfce6edad4b6335bf7a36e.exe
-
Size
23KB
-
MD5
043e344c6cc9477cbcfc0a483b1ca568
-
SHA1
52c4391b1a91c828823107cdf2db92e7142073d6
-
SHA256
424f837c55e7216646a63f6bbbbba766ed7521273ddfce6edad4b6335bf7a36e
-
SHA512
a705ac4259f754bea7ee73397fd1e1fc131c7d74065048020f520f63120ff1fee1355b6abfea645fd1b4d4aef8ab6da6ab0ad10346854d93463672e72ff032a5
-
SSDEEP
384:LMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZWe:Eb9glF51LRpcnuq
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-