General
-
Target
Server.rar
-
Size
17KB
-
Sample
241005-r9w2rsvgnm
-
MD5
e2f42e6ced2cf8096849f842cfca6f84
-
SHA1
4b9f8bc73f23371561cd33728a4afd9f045c8afb
-
SHA256
6586e2cc6f5a8d15e79dfcdbf76d56917cf49370397d05647db19f5e58e601fa
-
SHA512
d78e2ce38bb4640854429fb20c8c5181e22a33a416d3417f69f112363399f350088ac5ca356539324cfb93f5dd33eb90843284b07ef0147149ea88553e6260fa
-
SSDEEP
384:op8eCopmONIy4jIkSbTPxnHFa0RiUTxmaYcWxDxYwV3JruiVM:M8do3CycqTZHFjzTxtYc+BNJrul
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
123
0.tcp.eu.ngrok.io:18924
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
Server.exe
-
Size
43KB
-
MD5
1af3ef4f8e6c01a53f4f3b8c5e26d0a4
-
SHA1
ab9090eb9ab08d1c5b5c0aa6ec64cf3efc2dc240
-
SHA256
9c0d9b9cec6ac5a96098e42d347af4df9e0689725205803fc7aa7fdf374522ad
-
SHA512
9eff6851b27560036a6f38eb4c4d1c47fc7ba856af9d3e05ed4065b86f223c5fbd94721030237d75b9687e802ada469bdf62b1a9660fa580f55cca10f0c2b278
-
SSDEEP
384:JZybRy1STss7yKSVBuYYkEhxpS2/zsIij+ZsNO3PlpJKkkjh/TzF7pWnfcgreT0k:LMwk4smKSnuhlxkmuXQ/oio+L
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-