General
-
Target
b96212596ff9aed889c53e8493c5c5634bd4d9eaff9108e80b5249c35c21c293
-
Size
425KB
-
Sample
240406-cjjlesha31
-
MD5
bc08200ca0ea5694d5588116624b6415
-
SHA1
abbc19cd44e7fbe8ae06a012bbc934b033a7e221
-
SHA256
b96212596ff9aed889c53e8493c5c5634bd4d9eaff9108e80b5249c35c21c293
-
SHA512
89461303aad84931941392107d73c91f5d0ecd20e461c5e0848d350bdc44258b239df1924371937274b7765a75a3ae9466c8e8d02e43afa150d8dd2e794429ba
-
SSDEEP
12288:WquErHF6xC9D6DmR1J98w4oknqO/CyQftQYqYbLmKC:brl6kD68JmlokQfttqY2KC
Behavioral task
behavioral1
Sample
b96212596ff9aed889c53e8493c5c5634bd4d9eaff9108e80b5249c35c21c293.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b96212596ff9aed889c53e8493c5c5634bd4d9eaff9108e80b5249c35c21c293.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
njrat
0.7d
14 mai generateur xbox
89.94.35.57:1604
ef05e501c2e286164abf5fcaa961559f
-
reg_key
ef05e501c2e286164abf5fcaa961559f
-
splitter
|'|'|
Targets
-
-
Target
b96212596ff9aed889c53e8493c5c5634bd4d9eaff9108e80b5249c35c21c293
-
Size
425KB
-
MD5
bc08200ca0ea5694d5588116624b6415
-
SHA1
abbc19cd44e7fbe8ae06a012bbc934b033a7e221
-
SHA256
b96212596ff9aed889c53e8493c5c5634bd4d9eaff9108e80b5249c35c21c293
-
SHA512
89461303aad84931941392107d73c91f5d0ecd20e461c5e0848d350bdc44258b239df1924371937274b7765a75a3ae9466c8e8d02e43afa150d8dd2e794429ba
-
SSDEEP
12288:WquErHF6xC9D6DmR1J98w4oknqO/CyQftQYqYbLmKC:brl6kD68JmlokQfttqY2KC
Score10/10-
UPX dump on OEP (original entry point)
-
Modifies Windows Firewall
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-