General
-
Target
1728-55-0x00000000003C0000-0x00000000003CC000-memory.dmp
-
Size
48KB
-
Sample
230423-v9en9sge4x
-
MD5
9948b0078db02f20a849748bfe4d1d1c
-
SHA1
b452876d8daef06dffe35a8767386ae575c0f0d6
-
SHA256
4c56ade4409add1d78eac3b202a9fbd6afbd71878c31f798026082467ace2628
-
SHA512
bf1ea220ad74153aaf8379dea78cf322171a23cdd44203bbbfea188a2b31d3a9b16e60541eb2aed8c61e3f76c6fc0b983317b00ca31a01a8b63d082bee42f8d6
-
SSDEEP
384:MoWSkWHa55BgDVRGipkItzY6vZg36Eh7FpmRvR6JZlbw8hqIusZzZvt:7Juk9pHRpcnu2
Behavioral task
behavioral1
Sample
1728-55-0x00000000003C0000-0x00000000003CC000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1728-55-0x00000000003C0000-0x00000000003CC000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
njrat
0.7d
HacKed
blog.biliianstore.com:1991
76e66b105946ffdfd44b4673a61b0c13
-
reg_key
76e66b105946ffdfd44b4673a61b0c13
-
splitter
|'|'|
Targets
-
-
Target
1728-55-0x00000000003C0000-0x00000000003CC000-memory.dmp
-
Size
48KB
-
MD5
9948b0078db02f20a849748bfe4d1d1c
-
SHA1
b452876d8daef06dffe35a8767386ae575c0f0d6
-
SHA256
4c56ade4409add1d78eac3b202a9fbd6afbd71878c31f798026082467ace2628
-
SHA512
bf1ea220ad74153aaf8379dea78cf322171a23cdd44203bbbfea188a2b31d3a9b16e60541eb2aed8c61e3f76c6fc0b983317b00ca31a01a8b63d082bee42f8d6
-
SSDEEP
384:MoWSkWHa55BgDVRGipkItzY6vZg36Eh7FpmRvR6JZlbw8hqIusZzZvt:7Juk9pHRpcnu2
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-