General
-
Target
bb128ec75526887e8ebc2c1e4c0daf7b7ec1d41f039c0fb88e927b90fce6df9e.exe
-
Size
93KB
-
Sample
240912-j62h3syhqp
-
MD5
02cefbda3396f784034e71616e52d67e
-
SHA1
b38666d28beb902565260bf87d4f367911e94eda
-
SHA256
bb128ec75526887e8ebc2c1e4c0daf7b7ec1d41f039c0fb88e927b90fce6df9e
-
SHA512
4c17201e33a1c9fc6ff5cb476fe548447cdeeea20f494ea1a77bde704d97de7826b6ec880274fed2071d29499f3df09a8737770557f27d7d3134e16a8e80b92a
-
SSDEEP
1536:jy+C+xhUa9urgOBPmNvM4jEwzGi1dDVD/gS:jyIUa9urgOkdGi1dhY
Behavioral task
behavioral1
Sample
bb128ec75526887e8ebc2c1e4c0daf7b7ec1d41f039c0fb88e927b90fce6df9e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bb128ec75526887e8ebc2c1e4c0daf7b7ec1d41f039c0fb88e927b90fce6df9e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
Victim
hakim32.ddns.net:2000
0.tcp.eu.ngrok.io:11348
06b22b2a8c6c511de75528741425ba83
-
reg_key
06b22b2a8c6c511de75528741425ba83
-
splitter
|'|'|
Targets
-
-
Target
bb128ec75526887e8ebc2c1e4c0daf7b7ec1d41f039c0fb88e927b90fce6df9e.exe
-
Size
93KB
-
MD5
02cefbda3396f784034e71616e52d67e
-
SHA1
b38666d28beb902565260bf87d4f367911e94eda
-
SHA256
bb128ec75526887e8ebc2c1e4c0daf7b7ec1d41f039c0fb88e927b90fce6df9e
-
SHA512
4c17201e33a1c9fc6ff5cb476fe548447cdeeea20f494ea1a77bde704d97de7826b6ec880274fed2071d29499f3df09a8737770557f27d7d3134e16a8e80b92a
-
SSDEEP
1536:jy+C+xhUa9urgOBPmNvM4jEwzGi1dDVD/gS:jyIUa9urgOkdGi1dhY
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-