General
-
Target
30370507a2816a3b25424a98b0a257c3
-
Size
180KB
-
Sample
231231-k3gj6shga3
-
MD5
30370507a2816a3b25424a98b0a257c3
-
SHA1
fb835ea3b66243bc388e6cd7f1d165ca086b5fa5
-
SHA256
3240bb4e565eac6e610055410caf961539c916bc33679f00abe0d3cc55e76809
-
SHA512
87001beabd5c678b90d96898258ed09c10fef2506b9bf83d2e20fd2cf26aeb8a9de8fd2666b75059d4c8c6e2953f527d54d13426328a392d4a766d2c98386c81
-
SSDEEP
1536:HYVEJZ96Fs69zS7Reyhi9W9ItegcjNUH9Xz5tiU+n8iiBa7aU3n2kd7GM/i26WhD:Hd2YSLmQirb+rL
Static task
static1
Behavioral task
behavioral1
Sample
30370507a2816a3b25424a98b0a257c3.exe
Resource
win7-20231215-en
Malware Config
Extracted
njrat
v2.0
HacKed
error404.linkpc.net:1177
Svchost
-
reg_key
Svchost
-
splitter
|-F-|
Targets
-
-
Target
30370507a2816a3b25424a98b0a257c3
-
Size
180KB
-
MD5
30370507a2816a3b25424a98b0a257c3
-
SHA1
fb835ea3b66243bc388e6cd7f1d165ca086b5fa5
-
SHA256
3240bb4e565eac6e610055410caf961539c916bc33679f00abe0d3cc55e76809
-
SHA512
87001beabd5c678b90d96898258ed09c10fef2506b9bf83d2e20fd2cf26aeb8a9de8fd2666b75059d4c8c6e2953f527d54d13426328a392d4a766d2c98386c81
-
SSDEEP
1536:HYVEJZ96Fs69zS7Reyhi9W9ItegcjNUH9Xz5tiU+n8iiBa7aU3n2kd7GM/i26WhD:Hd2YSLmQirb+rL
-
r77 rootkit payload
Detects the payload of the r77 rootkit.
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-