General
-
Target
439d64eb2910ffaf4a2617869da14fcaaca0a12c26b9076c34ac808e31761241
-
Size
359KB
-
Sample
231021-mnm5hseb5z
-
MD5
afe633190dc0dff381eead056b24588c
-
SHA1
d34fb8f5eb0cbfe04541902ae340e455901a4899
-
SHA256
439d64eb2910ffaf4a2617869da14fcaaca0a12c26b9076c34ac808e31761241
-
SHA512
f87325bcbd335553f72bfc89fb8feb881d8abdf89a6612d05196ec4be21cd52ef86437c44abacd75c00ee38c8694263b4ee63203f5117c24ae254dec4b040829
-
SSDEEP
6144:+TouKrWBEu3/Z2lpGDHU3ykJyT+tjs/y+f2cAe81g:+ToPWBv/cpGrU3yDT+tjIyaZki
Static task
static1
Behavioral task
behavioral1
Sample
439d64eb2910ffaf4a2617869da14fcaaca0a12c26b9076c34ac808e31761241.exe
Resource
win7-20230831-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
6.tcp.eu.ngrok.io:11760
653655227aa6a4c8e1432c606bdf7fe3
-
reg_key
653655227aa6a4c8e1432c606bdf7fe3
-
splitter
|'|'|
Targets
-
-
Target
439d64eb2910ffaf4a2617869da14fcaaca0a12c26b9076c34ac808e31761241
-
Size
359KB
-
MD5
afe633190dc0dff381eead056b24588c
-
SHA1
d34fb8f5eb0cbfe04541902ae340e455901a4899
-
SHA256
439d64eb2910ffaf4a2617869da14fcaaca0a12c26b9076c34ac808e31761241
-
SHA512
f87325bcbd335553f72bfc89fb8feb881d8abdf89a6612d05196ec4be21cd52ef86437c44abacd75c00ee38c8694263b4ee63203f5117c24ae254dec4b040829
-
SSDEEP
6144:+TouKrWBEu3/Z2lpGDHU3ykJyT+tjs/y+f2cAe81g:+ToPWBv/cpGrU3yDT+tjIyaZki
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-