General
-
Target
24b2856cb9840f3b7131827e32cb73c9.bin
-
Size
13KB
-
Sample
230425-bgv11aff47
-
MD5
10a81f776a039c03c237a411a4406c7b
-
SHA1
e307db01ef03b7cabf545ec25e5506670ac71d24
-
SHA256
944b9d19590f1a55e501dd1305968a718c2cbcc25ec4eeaba4b31d2ffae2e328
-
SHA512
054a9040282d7076a0361a2756b3dab6a15c8c1e50755214670d00e0068bb6cef95726db01c16903cb3302eb4fa506414474cff7969acc32353bff6430d421dd
-
SSDEEP
384:p8WUz6VwZxLoIKOADPceaqUi9Z+8Ycp5SA/Z0u:ppUz6VmoILgPhaqJ90dcp5SAB0u
Static task
static1
Behavioral task
behavioral1
Sample
c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
njrat
0.7d
HacKed
amazon.thedreamsop.com:2211
Microsoft® Windows® Operating System
-
reg_key
Microsoft® Windows® Operating System
-
splitter
|'|'|
Targets
-
-
Target
c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe
-
Size
34KB
-
MD5
24b2856cb9840f3b7131827e32cb73c9
-
SHA1
306e69487143bb3756cba328f20aa55a3482c38c
-
SHA256
c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22
-
SHA512
8fef74742bca9faec30c144e9eec5e8fc4ac8f6d1fc1f680a2cf278c6511e6d1d11746e882a406b0cc2d79194a31c16e523930cc8f2866617c2f6232dc20b3e7
-
SSDEEP
768:b717qEQ4Un/guyq6tZ1f+escElzYcHeIm:b717Q4sDF6Z1mesbEI
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-