General
-
Target
Server.exe
-
Size
37KB
-
Sample
240417-jd6bkaae4z
-
MD5
de43783b8b13388eb629c7675983def1
-
SHA1
9d8285f25c0e8d2a16fae6cba5d5dfbcf2c1d1f7
-
SHA256
0837d32cd4aabde333efdfc2695f522c07e505131b3d36cc12618be91a057290
-
SHA512
1052d7f2a2efb7543b970278f11e0b71410386fb7f8b1322ec14ec5681caf114e4f5ef2e30e1d3975207406559595a51d0e3c496de35a9bef6a3b58a6ca32a43
-
SSDEEP
384:SgzZxj6ic7ri5Z7JAyk/Y4IvDfZeKQVerAF+rMRTyN/0L+EcoinblneHQM3epzXl:RznHJ7k/Y4IDZbQorM+rMRa8NuTht
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
njrat
im523
HacKed
require-spa.gl.at.ply.gg:29750
22a96a36e708412bc80ea4f11f20f4c1
-
reg_key
22a96a36e708412bc80ea4f11f20f4c1
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
37KB
-
MD5
de43783b8b13388eb629c7675983def1
-
SHA1
9d8285f25c0e8d2a16fae6cba5d5dfbcf2c1d1f7
-
SHA256
0837d32cd4aabde333efdfc2695f522c07e505131b3d36cc12618be91a057290
-
SHA512
1052d7f2a2efb7543b970278f11e0b71410386fb7f8b1322ec14ec5681caf114e4f5ef2e30e1d3975207406559595a51d0e3c496de35a9bef6a3b58a6ca32a43
-
SSDEEP
384:SgzZxj6ic7ri5Z7JAyk/Y4IvDfZeKQVerAF+rMRTyN/0L+EcoinblneHQM3epzXl:RznHJ7k/Y4IDZbQorM+rMRa8NuTht
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-