General
-
Target
a34d1b5f519b3951375190074c52821a
-
Size
31KB
-
Sample
231222-qp9xfshahl
-
MD5
a34d1b5f519b3951375190074c52821a
-
SHA1
a9b7bbad71812aa8abc2936546ab4cb705b5553c
-
SHA256
69b71ac7515f79929f3c41ca9b75d71d4eaecb450a3933b47ddfc86d4b64c667
-
SHA512
b55de0e7b921185a78fc772a2d627712d514793d9297a652cca8a3a579ca3d35b4a2898b44834ab4fbcadac71fd727034ef28174acd672c78a9b72d0dea5045f
-
SSDEEP
768:rnZghV5VXPKzxF+dt+XKvJ+rvaPQmIDUu0tiKtj:KfqciMQVkjj
Behavioral task
behavioral1
Sample
a34d1b5f519b3951375190074c52821a.exe
Resource
win7-20231215-en
Malware Config
Extracted
njrat
0.7d
Hacked
192.168.0.15:6522
aed23401e9e20fc857520763aabbc3ed
-
reg_key
aed23401e9e20fc857520763aabbc3ed
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
a34d1b5f519b3951375190074c52821a
-
Size
31KB
-
MD5
a34d1b5f519b3951375190074c52821a
-
SHA1
a9b7bbad71812aa8abc2936546ab4cb705b5553c
-
SHA256
69b71ac7515f79929f3c41ca9b75d71d4eaecb450a3933b47ddfc86d4b64c667
-
SHA512
b55de0e7b921185a78fc772a2d627712d514793d9297a652cca8a3a579ca3d35b4a2898b44834ab4fbcadac71fd727034ef28174acd672c78a9b72d0dea5045f
-
SSDEEP
768:rnZghV5VXPKzxF+dt+XKvJ+rvaPQmIDUu0tiKtj:KfqciMQVkjj
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-