General
-
Target
2cffc41b15b6a7796cbd3a16bf127323.bin
-
Size
29KB
-
Sample
230716-bp5keacb83
-
MD5
11fcaf739897ee4ffd359149fab4a17f
-
SHA1
6cb3319464dabe276015b69c60640f78cb3fda1d
-
SHA256
d8b677d34bcd86962054ad071ec4620bce4fb50ff93ada1be5ab212658002690
-
SHA512
200266feb533e3f31a79f24f444976dd9055a8afd8017b3b814b2d560d052486d6465aa29aef5a1fd50c35199ddb7bcae237a68b869171c9d69e4e52c43b837a
-
SSDEEP
768:BsXho28nuqaBkP5q4t5iBHvS4UsgRSx5Yb4rfzUd:2t8u3Bm8noUfYMrfzg
Behavioral task
behavioral1
Sample
8ef09a0498e51e4696d77b493deb20b33f8b17ebb02e19586aae97cd458cf5bd.exe
Resource
win7-20230712-en
Malware Config
Extracted
njrat
im523
HacKed
7.tcp.eu.ngrok.io:14936
ddfa0f7edcf1190a4c394097f851c263
-
reg_key
ddfa0f7edcf1190a4c394097f851c263
-
splitter
|'|'|
Targets
-
-
Target
8ef09a0498e51e4696d77b493deb20b33f8b17ebb02e19586aae97cd458cf5bd.exe
-
Size
54KB
-
MD5
2cffc41b15b6a7796cbd3a16bf127323
-
SHA1
d7433079b25c841ab4e105bbdd57aa90da9b41b7
-
SHA256
8ef09a0498e51e4696d77b493deb20b33f8b17ebb02e19586aae97cd458cf5bd
-
SHA512
4bdd0e29a374fd406e9b8abe7a21900b75fd1bab189c52c4112494c69186fbda28750d7bed7281a9e484e3fb1f8e9333c7e51c993a9256cfedb6e820bcdb6607
-
SSDEEP
768:l+NN9ZMTA3W1cGrM+rMRa8NuKVtntQvKuzkE5nwGc:lSN9u03Wa5+gRJNNySuzkqw
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-