General
-
Target
3eb8c476c0abcd01fdb799de83503e12.bin
-
Size
148KB
-
Sample
240430-bg8xvsgb8v
-
MD5
4c147a28f95a31b4fb811a1f27fdeddf
-
SHA1
cd5ab9d8cd433907061718e62dc42bb85c030a63
-
SHA256
1eebfaa3d4a78af444093bf5e6287445a992b02a522ca12d5d9672ec88204048
-
SHA512
492a363722562baa6b30e447b9896e6a5321e26e035acf890932195a341e09bc2a6b63bb0f5cd3e8ffdaa22ffd0ecfe3fdb80227fd9dd376d79dcf8114f391ed
-
SSDEEP
3072:W8rQAlrFqVXx1UVOhNhSxyqj5mcxAEyo2X117LwzA0arnilgKt1Z:WjAuhm1wo2Xf7Lws0Qi2S1Z
Behavioral task
behavioral1
Sample
554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exe
Resource
win7-20231129-en
Malware Config
Extracted
njrat
0.7d
MyBot
asero23.ddns.net:5552
863290bfb622fdfe0ad4e1b97536ae62
-
reg_key
863290bfb622fdfe0ad4e1b97536ae62
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exe
-
Size
158KB
-
MD5
3eb8c476c0abcd01fdb799de83503e12
-
SHA1
138aa012bb3b20a79aaf016af172a1b3106a7304
-
SHA256
554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986
-
SHA512
ed277e52d5348d1401a51f002e9f03bfada6481b2cab827f13fa39d54f5c42d4e4ac6627ced47f98fbc22010b044fb0d09b55c6133fc2746e9e78234975c2f85
-
SSDEEP
3072:tf/J2ULiTehI8FrkZTFieSzoSUYSziUP0ZMJG:32UL2i9FKFHd4SziUP0
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-