General
-
Target
1524-57-0x0000000000310000-0x0000000000322000-memory.dmp
-
Size
72KB
-
Sample
230521-gy9hlsbb4s
-
MD5
947af0fdddda235ab1cf2c8735591204
-
SHA1
953efb0afa8e05295995b2f3b1ffb5f2771c28e6
-
SHA256
0b7123b2792673039dbffa03db0b8da57e65b6bdb4ab10cef1972220530a6cd8
-
SHA512
881f5f8ccd77466950994c7d07ab650d84dd3f2e7008a59cb5d3096db8b9502ba02e9d9edef2c7e7fefddd646089b68ead9eadcb21f6582d9029461b86879be8
-
SSDEEP
384:MZy1qFgpWoy7krZtEVOsMBIHAkHC9D9O5UE5QzwBlpJNakkjh/TzF7pWnLH3gree:qnWol70ZtGOKgcvQO+GHd+LGkF
Behavioral task
behavioral1
Sample
1524-57-0x0000000000310000-0x0000000000322000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1524-57-0x0000000000310000-0x0000000000322000-memory.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
teste
0.tcp.ngrok.io:18236
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
1524-57-0x0000000000310000-0x0000000000322000-memory.dmp
-
Size
72KB
-
MD5
947af0fdddda235ab1cf2c8735591204
-
SHA1
953efb0afa8e05295995b2f3b1ffb5f2771c28e6
-
SHA256
0b7123b2792673039dbffa03db0b8da57e65b6bdb4ab10cef1972220530a6cd8
-
SHA512
881f5f8ccd77466950994c7d07ab650d84dd3f2e7008a59cb5d3096db8b9502ba02e9d9edef2c7e7fefddd646089b68ead9eadcb21f6582d9029461b86879be8
-
SSDEEP
384:MZy1qFgpWoy7krZtEVOsMBIHAkHC9D9O5UE5QzwBlpJNakkjh/TzF7pWnLH3gree:qnWol70ZtGOKgcvQO+GHd+LGkF
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-