General
-
Target
a118ee31e68cad149975fec84cf58543.exe
-
Size
103KB
-
Sample
230422-ryqevaha31
-
MD5
a118ee31e68cad149975fec84cf58543
-
SHA1
b778aefc62b4b43a182f1ba75a95bdf71a19e365
-
SHA256
456cc4e4131c6a7b6587d48148e0dc9dbb20ce34c285dc8db9dcb61f7fec7c41
-
SHA512
4d59d8ab11b8addca07c7572384cf19e065d91e5483a06813042cf69dd3dee3737f41eaa8fdbc5f078a49db2a51114e067a56d5e08c5651e2e34b8bc2aef566f
-
SSDEEP
1536:hzRN2ltJYXS+gRJNSJ/u+CEhWFah4CH5Oj:hz32jMS+yJEJ/u+EFahv5
Behavioral task
behavioral1
Sample
a118ee31e68cad149975fec84cf58543.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a118ee31e68cad149975fec84cf58543.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
njrat
im523
Лошара
4.tcp.eu.ngrok.io:19376
691583ddfa9cbbfb56c8300dd9c284ad
-
reg_key
691583ddfa9cbbfb56c8300dd9c284ad
-
splitter
|'|'|
Targets
-
-
Target
a118ee31e68cad149975fec84cf58543.exe
-
Size
103KB
-
MD5
a118ee31e68cad149975fec84cf58543
-
SHA1
b778aefc62b4b43a182f1ba75a95bdf71a19e365
-
SHA256
456cc4e4131c6a7b6587d48148e0dc9dbb20ce34c285dc8db9dcb61f7fec7c41
-
SHA512
4d59d8ab11b8addca07c7572384cf19e065d91e5483a06813042cf69dd3dee3737f41eaa8fdbc5f078a49db2a51114e067a56d5e08c5651e2e34b8bc2aef566f
-
SSDEEP
1536:hzRN2ltJYXS+gRJNSJ/u+CEhWFah4CH5Oj:hz32jMS+yJEJ/u+EFahv5
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-