General
-
Target
5846a4f316160ded59379aaecc48de08.exe
-
Size
103KB
-
Sample
230326-j1rfxshg9w
-
MD5
5846a4f316160ded59379aaecc48de08
-
SHA1
b5af1332a27e9e7a70b85dded3ee294a7b6b2446
-
SHA256
2ca10a991b5151eb236b4faed3a08e7f44153286b53dea588f888dc0174af8a3
-
SHA512
ff43812896e14b9efecd00a642fd374e4d60fd4f9389a620b9c85138f757bf950677cbba102513a2cfc01f5e1990f04e24cb1b6ef7fe055829cae8fadca3d93e
-
SSDEEP
768:NAY1lN7oYUGF6DrM+rMRa8NunC6tRJghs:NAY1vcdGMc+gRJNV4J
Behavioral task
behavioral1
Sample
5846a4f316160ded59379aaecc48de08.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5846a4f316160ded59379aaecc48de08.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
njrat
im523
Geforce Experience
2.tcp.eu.ngrok.io:17425
00c8a057ad6a6d7c6c7858e5303b7a44
-
reg_key
00c8a057ad6a6d7c6c7858e5303b7a44
-
splitter
|'|'|
Targets
-
-
Target
5846a4f316160ded59379aaecc48de08.exe
-
Size
103KB
-
MD5
5846a4f316160ded59379aaecc48de08
-
SHA1
b5af1332a27e9e7a70b85dded3ee294a7b6b2446
-
SHA256
2ca10a991b5151eb236b4faed3a08e7f44153286b53dea588f888dc0174af8a3
-
SHA512
ff43812896e14b9efecd00a642fd374e4d60fd4f9389a620b9c85138f757bf950677cbba102513a2cfc01f5e1990f04e24cb1b6ef7fe055829cae8fadca3d93e
-
SSDEEP
768:NAY1lN7oYUGF6DrM+rMRa8NunC6tRJghs:NAY1vcdGMc+gRJNV4J
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-