General
-
Target
elol.exe
-
Size
214KB
-
Sample
240223-snpagabh54
-
MD5
faba0d141987f243c5996bacbde9c24a
-
SHA1
5059d4e64df99075da4b0dd75290ae0d504ef2d6
-
SHA256
5dae1887c9219823ef4465936e5b45137132eb48fb0dc2197a54ee2e31f0dbdb
-
SHA512
9e478196cf230ce41982014206bd5c683814620a2b60560e5b4354f818c6842163fc33fb5cdbb1bbae602078f6d6ca2a6bd75ec50adb39049ba38e4fd90a3e9c
-
SSDEEP
6144:6Iz9zjvM92B+64kQ2EJam2dNREz9FdOZMJwGuE4QyZom8exsrPR5TE7D0XuDTTo6:6INs2B+64kQHam2dNREz9FdOZMJwGuEu
Behavioral task
behavioral1
Sample
elol.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
elol.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
elol.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral4
Sample
elol.exe
Resource
win11-20240221-en
Malware Config
Extracted
njrat
Platinum
HacKed
127.0.0.1:12044
Client.exe
-
reg_key
Client.exe
-
splitter
|Ghost|
Targets
-
-
Target
elol.exe
-
Size
214KB
-
MD5
faba0d141987f243c5996bacbde9c24a
-
SHA1
5059d4e64df99075da4b0dd75290ae0d504ef2d6
-
SHA256
5dae1887c9219823ef4465936e5b45137132eb48fb0dc2197a54ee2e31f0dbdb
-
SHA512
9e478196cf230ce41982014206bd5c683814620a2b60560e5b4354f818c6842163fc33fb5cdbb1bbae602078f6d6ca2a6bd75ec50adb39049ba38e4fd90a3e9c
-
SSDEEP
6144:6Iz9zjvM92B+64kQ2EJam2dNREz9FdOZMJwGuE4QyZom8exsrPR5TE7D0XuDTTo6:6INs2B+64kQHam2dNREz9FdOZMJwGuEu
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-