General
-
Target
1dfe93c432a71787bec625e9f37aea5c.exe
-
Size
37KB
-
Sample
230716-ygx7page73
-
MD5
1dfe93c432a71787bec625e9f37aea5c
-
SHA1
c733d9b06b59e9cd883787998d36cb890a601ef2
-
SHA256
a01ef3fdd7c3df2e845dca28c37e9244cb1823c655da892ff5d5dacb9db70afd
-
SHA512
539b983f1ff6b954e1015cd11190d9d6562e23b3c88fd1379a7cec008479a8d8fba9606641d1c11807ee44986bf1f11562f770a448d76d7d0c4ed5bbc3bd0998
-
SSDEEP
384:tdKvEiTbHvpWNcZ0y8f7CTvvrILkCwE3rAF+rMRTyN/0L+EcoinblneHQM3epzX9:DKXTZ38f7CTv8FwKrM+rMRa8NuLGKt
Behavioral task
behavioral1
Sample
1dfe93c432a71787bec625e9f37aea5c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1dfe93c432a71787bec625e9f37aea5c.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
njrat
im523
HacKed
0.tcp.eu.ngrok.io:16261
0dfab35b0ccfd955e7d94fa1f5dce520
-
reg_key
0dfab35b0ccfd955e7d94fa1f5dce520
-
splitter
|'|'|
Targets
-
-
Target
1dfe93c432a71787bec625e9f37aea5c.exe
-
Size
37KB
-
MD5
1dfe93c432a71787bec625e9f37aea5c
-
SHA1
c733d9b06b59e9cd883787998d36cb890a601ef2
-
SHA256
a01ef3fdd7c3df2e845dca28c37e9244cb1823c655da892ff5d5dacb9db70afd
-
SHA512
539b983f1ff6b954e1015cd11190d9d6562e23b3c88fd1379a7cec008479a8d8fba9606641d1c11807ee44986bf1f11562f770a448d76d7d0c4ed5bbc3bd0998
-
SSDEEP
384:tdKvEiTbHvpWNcZ0y8f7CTvvrILkCwE3rAF+rMRTyN/0L+EcoinblneHQM3epzX9:DKXTZ38f7CTv8FwKrM+rMRa8NuLGKt
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-