General
-
Target
b02c3cc8be9da55c745c60521c8dc3d2c0a1494cfc8127b6785b58496a779383.exe
-
Size
37KB
-
Sample
231008-kfvhhsah3x
-
MD5
d85e69803221016200d9c029d390554f
-
SHA1
1353f0125de814a9ab073f43ee113548f7b09bc8
-
SHA256
b02c3cc8be9da55c745c60521c8dc3d2c0a1494cfc8127b6785b58496a779383
-
SHA512
fa06be7cc9fa6f1ed2580e9530a06f19b0df10a0b97e7af8db279e22333d8c7f08ea7cfb2f7acd4bb09601429eac2767425ad3fb8fe20e0c3086073062461bb8
-
SSDEEP
384:KcnM6ikLRxdDsyNyyszHQxvDe8mkzWrAF+rMRTyN/0L+EcoinblneHQM3epzXFAI:VnbeyNBszHQxC1kirM+rMRa8NukYt
Behavioral task
behavioral1
Sample
b02c3cc8be9da55c745c60521c8dc3d2c0a1494cfc8127b6785b58496a779383.exe
Resource
win7-20230831-en
Malware Config
Extracted
njrat
im523
HacKed
0.tcp.eu.ngrok.io:18801
118f5683ac8ec11fa5ebd063bb65cc3b
-
reg_key
118f5683ac8ec11fa5ebd063bb65cc3b
-
splitter
|'|'|
Targets
-
-
Target
b02c3cc8be9da55c745c60521c8dc3d2c0a1494cfc8127b6785b58496a779383.exe
-
Size
37KB
-
MD5
d85e69803221016200d9c029d390554f
-
SHA1
1353f0125de814a9ab073f43ee113548f7b09bc8
-
SHA256
b02c3cc8be9da55c745c60521c8dc3d2c0a1494cfc8127b6785b58496a779383
-
SHA512
fa06be7cc9fa6f1ed2580e9530a06f19b0df10a0b97e7af8db279e22333d8c7f08ea7cfb2f7acd4bb09601429eac2767425ad3fb8fe20e0c3086073062461bb8
-
SSDEEP
384:KcnM6ikLRxdDsyNyyszHQxvDe8mkzWrAF+rMRTyN/0L+EcoinblneHQM3epzXFAI:VnbeyNBszHQxC1kirM+rMRa8NukYt
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-