General
-
Target
3708d1bd614bd0a96c34dc96c7ef75bb6386b401b6e81b019293a8964447c90a.exe
-
Size
37KB
-
Sample
240425-t4bvracf21
-
MD5
b1048f879fa97d356045037bddc4add3
-
SHA1
5e4a581b9756c930af7f0f07020fa668e1ec7143
-
SHA256
3708d1bd614bd0a96c34dc96c7ef75bb6386b401b6e81b019293a8964447c90a
-
SHA512
770fba138942174b55982a5c69e8c97d17eeab6a23cb05fbccc28cf2754a6b006d43e2d07edf55990210f0e5d7ec87543b182e648ec8b76e57a7b354eb406f5b
-
SSDEEP
384:mmZ+vEiTbZvpWNcZ0y8f1CRDX5CLk6SiprAF+rMRTyN/0L+EcoinblneHQM3epzy:n+dTZ38f1CRDcNSerM+rMRa8Nu4Rt
Behavioral task
behavioral1
Sample
3708d1bd614bd0a96c34dc96c7ef75bb6386b401b6e81b019293a8964447c90a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3708d1bd614bd0a96c34dc96c7ef75bb6386b401b6e81b019293a8964447c90a.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
njrat
im523
HacKed
0.tcp.eu.ngrok.io:12143
a84dc4708d9317c54957297ccf114c45
-
reg_key
a84dc4708d9317c54957297ccf114c45
-
splitter
|'|'|
Targets
-
-
Target
3708d1bd614bd0a96c34dc96c7ef75bb6386b401b6e81b019293a8964447c90a.exe
-
Size
37KB
-
MD5
b1048f879fa97d356045037bddc4add3
-
SHA1
5e4a581b9756c930af7f0f07020fa668e1ec7143
-
SHA256
3708d1bd614bd0a96c34dc96c7ef75bb6386b401b6e81b019293a8964447c90a
-
SHA512
770fba138942174b55982a5c69e8c97d17eeab6a23cb05fbccc28cf2754a6b006d43e2d07edf55990210f0e5d7ec87543b182e648ec8b76e57a7b354eb406f5b
-
SSDEEP
384:mmZ+vEiTbZvpWNcZ0y8f1CRDX5CLk6SiprAF+rMRTyN/0L+EcoinblneHQM3epzy:n+dTZ38f1CRDcNSerM+rMRa8Nu4Rt
Score8/10-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-