General
-
Target
00f1f5306a56f3f7b974b492624252c9.bin
-
Size
10KB
-
Sample
230330-bcmttsae22
-
MD5
5571e33043c719e1f32f40feed025b7d
-
SHA1
51b418cef746e3ba98f40752b0046e9082e912f2
-
SHA256
ea7b6a646acf868d2a664faee0b2ef448b5b5ef56dab2f2aaf38e24583814347
-
SHA512
b2460b0a5c7a95380c9ed7395cbe56205bfcb7a1a4ed6daeaf89a3714bd41d183d01ce439a2df5f0f55de67ddb5fec9270b8e2bb09b219aa0b24185042a375f9
-
SSDEEP
192:CWjBQ42/df+LUbKUSb4swyMXcpNt3S4Nwq/ZM7MZUIpFg9YhbFCnYHFab+YPUe:CaQ4ofDSbTscpNt3/Nw4yupW+hpnla5R
Behavioral task
behavioral1
Sample
b6eb6e88c8aad20fad304972eef236e283ba139c339b662c877d18606427be8e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b6eb6e88c8aad20fad304972eef236e283ba139c339b662c877d18606427be8e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
njrat
0.7d
HacKed
kassar963-63714.portmap.host:60000
69e2e2bb4c3b8058a86847f0287d8ca1
-
reg_key
69e2e2bb4c3b8058a86847f0287d8ca1
-
splitter
|'|'|
Targets
-
-
Target
b6eb6e88c8aad20fad304972eef236e283ba139c339b662c877d18606427be8e.exe
-
Size
22KB
-
MD5
00f1f5306a56f3f7b974b492624252c9
-
SHA1
dc42afbc3ae037bfb948e7ba2a3fa1857eb9f4f0
-
SHA256
b6eb6e88c8aad20fad304972eef236e283ba139c339b662c877d18606427be8e
-
SHA512
c059be9a1ed34d3072e307825e0300f2d718cdadee893d667a506dd448e15832db4495002fdeef13d08b1d4a20e90951941b73733974a59b932aec4d20e4442c
-
SSDEEP
384:jc6CqbFYh3odrVCGiHssOB4b6i6fgpEupNXRmRvR6JZlbw8hqIusZzZdvf:YIU0twQRpcnuw3
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-