General
-
Target
07a21f58fadf865991cc47e4c3428ea7_JC.exe
-
Size
255KB
-
Sample
230901-w8b3esgf4x
-
MD5
07a21f58fadf865991cc47e4c3428ea7
-
SHA1
b0e2f64485585327fcf3ed664c56f60b1a53264f
-
SHA256
d2b38c64e744d4965fae1d7d8c2bbcbd60002859b7648c3b6379bf12ec0f4ca6
-
SHA512
fbe16db36ba81be69f96d8a14c99247ee0673edf34425b3c9529bf941cba1503fcfc2a3d85b7378d5a57264789d09d99037247768e96c0194df3db62ec86198c
-
SSDEEP
3072:qsdc0T4zpGolvFztvavvavXjaLXHvvAvvvHvE/Lwnavvvvvvvvvv5vvvvtvvvCd8:P4zpbjs/kiulugQkcBd
Behavioral task
behavioral1
Sample
07a21f58fadf865991cc47e4c3428ea7_JC.exe
Resource
win7-20230831-en
Malware Config
Extracted
njrat
0.7d
Lammer
0.tcp.ap.ngrok.io:17008
1c335d1c8eb2631ada58f369d6efd229
-
reg_key
1c335d1c8eb2631ada58f369d6efd229
-
splitter
|'|'|
Targets
-
-
Target
07a21f58fadf865991cc47e4c3428ea7_JC.exe
-
Size
255KB
-
MD5
07a21f58fadf865991cc47e4c3428ea7
-
SHA1
b0e2f64485585327fcf3ed664c56f60b1a53264f
-
SHA256
d2b38c64e744d4965fae1d7d8c2bbcbd60002859b7648c3b6379bf12ec0f4ca6
-
SHA512
fbe16db36ba81be69f96d8a14c99247ee0673edf34425b3c9529bf941cba1503fcfc2a3d85b7378d5a57264789d09d99037247768e96c0194df3db62ec86198c
-
SSDEEP
3072:qsdc0T4zpGolvFztvavvavXjaLXHvvAvvvHvE/Lwnavvvvvvvvvv5vvvvtvvvCd8:P4zpbjs/kiulugQkcBd
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-