General
-
Target
c1fe9d30d0e68db7d12e51b84cc7c5ec.exe
-
Size
108KB
-
Sample
230612-btjhqsad74
-
MD5
c1fe9d30d0e68db7d12e51b84cc7c5ec
-
SHA1
4aeb621755a1fa628e29551fbcaedaf4905b22e3
-
SHA256
d91ce4d753b5d0c4a80fc837d83b9c2ddbb49a22f70536e9e7c23f395e3e45ef
-
SHA512
c2ae3cfaf477290dc24859e69019a2016ff9ba3de3287bdc43ad6797f0847d053b17770f5276a8065fc88e2cae90fefe997189fe75e90b5cef53c451bef8c612
-
SSDEEP
1536:t+7kVbPGHz88EbE1pjEwzGi1dDxD/gSh+u:t+0PGHzmI1mi1d1Y
Behavioral task
behavioral1
Sample
c1fe9d30d0e68db7d12e51b84cc7c5ec.exe
Resource
win7-20230220-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
5.tcp.eu.ngrok.io:13266
c165200ef8d2ffdfc7fed74e6ae6556d
-
reg_key
c165200ef8d2ffdfc7fed74e6ae6556d
-
splitter
|'|'|
Targets
-
-
Target
c1fe9d30d0e68db7d12e51b84cc7c5ec.exe
-
Size
108KB
-
MD5
c1fe9d30d0e68db7d12e51b84cc7c5ec
-
SHA1
4aeb621755a1fa628e29551fbcaedaf4905b22e3
-
SHA256
d91ce4d753b5d0c4a80fc837d83b9c2ddbb49a22f70536e9e7c23f395e3e45ef
-
SHA512
c2ae3cfaf477290dc24859e69019a2016ff9ba3de3287bdc43ad6797f0847d053b17770f5276a8065fc88e2cae90fefe997189fe75e90b5cef53c451bef8c612
-
SSDEEP
1536:t+7kVbPGHz88EbE1pjEwzGi1dDxD/gSh+u:t+0PGHzmI1mi1d1Y
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-