General
-
Target
1d9633b94f8cff6aebe79da9f100a8d85432910f16c8953b5bc4af9e33b292f6
-
Size
93KB
-
Sample
231229-aagdlabfgk
-
MD5
0c53c3f4e1d15472e28eece8e12c1ba3
-
SHA1
e3bbdce44feb9ecca23d4c3a3f830b4d9c2d83ad
-
SHA256
1d9633b94f8cff6aebe79da9f100a8d85432910f16c8953b5bc4af9e33b292f6
-
SHA512
cd712b8d00436c152c4abef6766fc6c7c069b1a50cde65f3e5a4194fe5e39bd3b5c1f6d51087df692db7c687cb8d8fb58e6727fa9eb5d1646ce6d21657d42a1e
-
SSDEEP
768:CY32UnD9O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk39sGv:0UxOx6baIa9RZj00ljEwzGi1dDNDLgS
Behavioral task
behavioral1
Sample
1d9633b94f8cff6aebe79da9f100a8d85432910f16c8953b5bc4af9e33b292f6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d9633b94f8cff6aebe79da9f100a8d85432910f16c8953b5bc4af9e33b292f6.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
6.tcp.eu.ngrok.io:10883
9e9faa9919684e0fc28630a083f73cc1
-
reg_key
9e9faa9919684e0fc28630a083f73cc1
-
splitter
|'|'|
Targets
-
-
Target
1d9633b94f8cff6aebe79da9f100a8d85432910f16c8953b5bc4af9e33b292f6
-
Size
93KB
-
MD5
0c53c3f4e1d15472e28eece8e12c1ba3
-
SHA1
e3bbdce44feb9ecca23d4c3a3f830b4d9c2d83ad
-
SHA256
1d9633b94f8cff6aebe79da9f100a8d85432910f16c8953b5bc4af9e33b292f6
-
SHA512
cd712b8d00436c152c4abef6766fc6c7c069b1a50cde65f3e5a4194fe5e39bd3b5c1f6d51087df692db7c687cb8d8fb58e6727fa9eb5d1646ce6d21657d42a1e
-
SSDEEP
768:CY32UnD9O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk39sGv:0UxOx6baIa9RZj00ljEwzGi1dDNDLgS
Score8/10-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-