General
-
Target
fetg.exe
-
Size
37KB
-
Sample
240413-zn13lahg27
-
MD5
ae4e4403a38930cfb2162c624e8b38d2
-
SHA1
b9cedecd6d6b365d785b1da0543b3957461d19d4
-
SHA256
f96909c54e460ec8c89fc3b8a160d523d27089844fa8bbfffa2c99eef188cee3
-
SHA512
c73fa77c3cf00808633a7a52a8db3b137e15ad4ae97912caced69287ca34debfb79516218a17b287d5234969b2ca11d11f3775ea427b3799de808ef8dd56f1cf
-
SSDEEP
384:zaqIiuVjtD+P3V+y0bf2TKtvN4suKfYrAF+rMRTyN/0L+EcoinblneHQM3epzXdk:ONmV10bf2TKtClKQrM+rMRa8Nuyvt
Malware Config
Extracted
njrat
im523
HacKed
tcp.eu.ngrok.io:15640
cbe1352502f3ef3b65e89dcbf4c51389
-
reg_key
cbe1352502f3ef3b65e89dcbf4c51389
-
splitter
|'|'|
Targets
-
-
Target
fetg.exe
-
Size
37KB
-
MD5
ae4e4403a38930cfb2162c624e8b38d2
-
SHA1
b9cedecd6d6b365d785b1da0543b3957461d19d4
-
SHA256
f96909c54e460ec8c89fc3b8a160d523d27089844fa8bbfffa2c99eef188cee3
-
SHA512
c73fa77c3cf00808633a7a52a8db3b137e15ad4ae97912caced69287ca34debfb79516218a17b287d5234969b2ca11d11f3775ea427b3799de808ef8dd56f1cf
-
SSDEEP
384:zaqIiuVjtD+P3V+y0bf2TKtvN4suKfYrAF+rMRTyN/0L+EcoinblneHQM3epzXdk:ONmV10bf2TKtClKQrM+rMRa8Nuyvt
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-