General
-
Target
bd0d8aaf3c8509f3170b3464a4949cf87a936c3fc1e3a16a2665b085a7046a69
-
Size
425KB
-
Sample
240406-cqyzpaha8z
-
MD5
b9a55c795b8b1ea38fe9a8f4549f2762
-
SHA1
ad8ba6823cd36261f21527391ff32532ef3cbdb4
-
SHA256
bd0d8aaf3c8509f3170b3464a4949cf87a936c3fc1e3a16a2665b085a7046a69
-
SHA512
0ebc3b25ce7855cf0df78d6eb12adf07fc55e881d55d762e74f8638d3f9821e6e90a9daac10c8d71cf49f9ee084ffadd180c6728ab098a35c52755f64c063e01
-
SSDEEP
12288:WquErHF6xC9D6DmR1J98w4oknqO/CyQftQYqYbLmKz:brl6kD68JmlokQfttqY2Kz
Behavioral task
behavioral1
Sample
bd0d8aaf3c8509f3170b3464a4949cf87a936c3fc1e3a16a2665b085a7046a69.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd0d8aaf3c8509f3170b3464a4949cf87a936c3fc1e3a16a2665b085a7046a69.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
njrat
0.7d
14 mai generateur xbox
89.94.35.57:1604
ef05e501c2e286164abf5fcaa961559f
-
reg_key
ef05e501c2e286164abf5fcaa961559f
-
splitter
|'|'|
Targets
-
-
Target
bd0d8aaf3c8509f3170b3464a4949cf87a936c3fc1e3a16a2665b085a7046a69
-
Size
425KB
-
MD5
b9a55c795b8b1ea38fe9a8f4549f2762
-
SHA1
ad8ba6823cd36261f21527391ff32532ef3cbdb4
-
SHA256
bd0d8aaf3c8509f3170b3464a4949cf87a936c3fc1e3a16a2665b085a7046a69
-
SHA512
0ebc3b25ce7855cf0df78d6eb12adf07fc55e881d55d762e74f8638d3f9821e6e90a9daac10c8d71cf49f9ee084ffadd180c6728ab098a35c52755f64c063e01
-
SSDEEP
12288:WquErHF6xC9D6DmR1J98w4oknqO/CyQftQYqYbLmKz:brl6kD68JmlokQfttqY2Kz
Score10/10-
UPX dump on OEP (original entry point)
-
Modifies Windows Firewall
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-