General
-
Target
8a40b60f37d095570a50f5edf2680d48.exe
-
Size
31KB
-
Sample
241016-vddr4avakq
-
MD5
8a40b60f37d095570a50f5edf2680d48
-
SHA1
c29668edffbfa0e444ad56fbd5bc71d3aa81281e
-
SHA256
4c64981ad17309e21b795b0af8fc4174d4ebeaca4129ab73b50a37b96066daa3
-
SHA512
4c61b139630082394d2c9db2b2e7e651b3dac083345044e42cfa15abd4e690a1aabe7961ecbe9453b3b0cf1ad2b5811a2af7d22de6c49d91f8acb768271a9686
-
SSDEEP
768:AjMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0ti9Cj:XkKdisvQVkVj
Behavioral task
behavioral1
Sample
8a40b60f37d095570a50f5edf2680d48.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a40b60f37d095570a50f5edf2680d48.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
upss
0.tcp.eu.ngrok.io:14673
4f7098563ca32e152a50bf8bea3737b3
-
reg_key
4f7098563ca32e152a50bf8bea3737b3
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
8a40b60f37d095570a50f5edf2680d48.exe
-
Size
31KB
-
MD5
8a40b60f37d095570a50f5edf2680d48
-
SHA1
c29668edffbfa0e444ad56fbd5bc71d3aa81281e
-
SHA256
4c64981ad17309e21b795b0af8fc4174d4ebeaca4129ab73b50a37b96066daa3
-
SHA512
4c61b139630082394d2c9db2b2e7e651b3dac083345044e42cfa15abd4e690a1aabe7961ecbe9453b3b0cf1ad2b5811a2af7d22de6c49d91f8acb768271a9686
-
SSDEEP
768:AjMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0ti9Cj:XkKdisvQVkVj
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-