General
-
Target
2a9eb7b0c040619387dcab44f7e040d88cd05712373dcec6bd855f283e89a981.exe
-
Size
37KB
-
Sample
240916-bf2gds1hmq
-
MD5
0286312da20e2e5aafc83cfd0b211aeb
-
SHA1
6d67059a536285ad0182ffebea8f714a785dc153
-
SHA256
2a9eb7b0c040619387dcab44f7e040d88cd05712373dcec6bd855f283e89a981
-
SHA512
6a1100a1d8996e2cbbe354a2a8193ac54336509c1991266f9d1e03f9ab83fdd7c61df692413465a731e5badcb00f8f86e39ee48d5f6ed832c356dfaa63f87e37
-
SSDEEP
384:KmlIIiutjtD+P3V+y0bnu7ytflgs+SiwrAF+rMRTyN/0L+EcoinblneHQM3epzXM:bPmV10bnu7ytCVSbrM+rMRa8Nujmt
Behavioral task
behavioral1
Sample
2a9eb7b0c040619387dcab44f7e040d88cd05712373dcec6bd855f283e89a981.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2a9eb7b0c040619387dcab44f7e040d88cd05712373dcec6bd855f283e89a981.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
im523
farter
0.tcp.eu.ngrok.io:10472
6b90c9f607e615fb2ec10658187bc2eb
-
reg_key
6b90c9f607e615fb2ec10658187bc2eb
-
splitter
|'|'|
Targets
-
-
Target
2a9eb7b0c040619387dcab44f7e040d88cd05712373dcec6bd855f283e89a981.exe
-
Size
37KB
-
MD5
0286312da20e2e5aafc83cfd0b211aeb
-
SHA1
6d67059a536285ad0182ffebea8f714a785dc153
-
SHA256
2a9eb7b0c040619387dcab44f7e040d88cd05712373dcec6bd855f283e89a981
-
SHA512
6a1100a1d8996e2cbbe354a2a8193ac54336509c1991266f9d1e03f9ab83fdd7c61df692413465a731e5badcb00f8f86e39ee48d5f6ed832c356dfaa63f87e37
-
SSDEEP
384:KmlIIiutjtD+P3V+y0bnu7ytflgs+SiwrAF+rMRTyN/0L+EcoinblneHQM3epzXM:bPmV10bnu7ytCVSbrM+rMRa8Nujmt
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-