General
-
Target
a8b04589810f09b2174ff2c934c2daa1.exe
-
Size
69KB
-
Sample
230512-cpz6csbd49
-
MD5
a8b04589810f09b2174ff2c934c2daa1
-
SHA1
d146e3319965745b2bf587321b8bcd07fd869e98
-
SHA256
8e600aa009bd52af21dc58aad0f667bc6251ac26959ac8c3a9ad3b07c843e7d8
-
SHA512
cb988ab3520f4ae85f39343aad0f7b62abd767b803b9503cc07550de96cdaec51dc4f1a8a4a7141c8424326266758966f44278163f98060aeb10616d7d26b42d
-
SSDEEP
384:jTQ+SAN7uprgvM5OSUswZXg69gbm4hfpZmRvR6JZlbw8hqIusZzZZ+FK9Sjv:jkOaxVUvRpcnun09Sb
Behavioral task
behavioral1
Sample
a8b04589810f09b2174ff2c934c2daa1.exe
Resource
win7-20230220-en
Malware Config
Extracted
njrat
0.7d
Lammer
0.tcp.sa.ngrok.io:11856
77dd3612cf32d44e269473290274f858
-
reg_key
77dd3612cf32d44e269473290274f858
-
splitter
|'|'|
Targets
-
-
Target
a8b04589810f09b2174ff2c934c2daa1.exe
-
Size
69KB
-
MD5
a8b04589810f09b2174ff2c934c2daa1
-
SHA1
d146e3319965745b2bf587321b8bcd07fd869e98
-
SHA256
8e600aa009bd52af21dc58aad0f667bc6251ac26959ac8c3a9ad3b07c843e7d8
-
SHA512
cb988ab3520f4ae85f39343aad0f7b62abd767b803b9503cc07550de96cdaec51dc4f1a8a4a7141c8424326266758966f44278163f98060aeb10616d7d26b42d
-
SSDEEP
384:jTQ+SAN7uprgvM5OSUswZXg69gbm4hfpZmRvR6JZlbw8hqIusZzZZ+FK9Sjv:jkOaxVUvRpcnun09Sb
-
Modifies Windows Firewall
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-