General
-
Target
Server.exe
-
Size
43KB
-
Sample
240417-hplkvsgc69
-
MD5
ba1679841e5fe4d6e57fa247de4774a8
-
SHA1
8b99c2716c6c5359c452c744382801b6c66ce56c
-
SHA256
e1d7377617ccd1f1c75808e60817946cc29e81a5ea079df2d0f147d8778d58f7
-
SHA512
68c75e7f98cbe2ad8bf68f8114f586d5ae0a922459fd9f1ef8b639ccdb7129c779195cdf9aa3970e10375c78ab9e59d50e41890c74f2edbbb44868b7ac0da2a8
-
SSDEEP
384:/ZyjVK7U8yrKWh7TtpEonj8lJ9UtzDgIij+ZsNO3PlpJKkkjh/TzF7pWn/G/greH:BUcY5rHh7Zvnj8l43uXQ/o33+L
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
returns-vary.gl.at.ply.gg:8188
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
Server.exe
-
Size
43KB
-
MD5
ba1679841e5fe4d6e57fa247de4774a8
-
SHA1
8b99c2716c6c5359c452c744382801b6c66ce56c
-
SHA256
e1d7377617ccd1f1c75808e60817946cc29e81a5ea079df2d0f147d8778d58f7
-
SHA512
68c75e7f98cbe2ad8bf68f8114f586d5ae0a922459fd9f1ef8b639ccdb7129c779195cdf9aa3970e10375c78ab9e59d50e41890c74f2edbbb44868b7ac0da2a8
-
SSDEEP
384:/ZyjVK7U8yrKWh7TtpEonj8lJ9UtzDgIij+ZsNO3PlpJKkkjh/TzF7pWn/G/greH:BUcY5rHh7Zvnj8l43uXQ/o33+L
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-