General
-
Target
00d1f7f784455f77516c396b46d234d64a2cfa8f70bab5f1a9f8bcd97aa502fd.exe
-
Size
65KB
-
Sample
241017-bdfrxatbnc
-
MD5
129de086d65beaa64f4789c6f467fcd2
-
SHA1
c4f4b9c9a701dc64522ab7031aaa04bcb4e5f54e
-
SHA256
00d1f7f784455f77516c396b46d234d64a2cfa8f70bab5f1a9f8bcd97aa502fd
-
SHA512
7981172ebdf0083ca6ae34734c1993fc1aef667909e1daa08f4c9a236831da83cd73c4f4a9c7745870b430d6200620662797f1f7eba232b4574a06b81553d04b
-
SSDEEP
1536:tWOeboN36tbQviFw1ScTIBnvbBfLteF3nLrB9z3nWaF9bZS9vM:tWOeboN36tbQviFCtcBnVfWl9zGaF9bN
Behavioral task
behavioral1
Sample
00d1f7f784455f77516c396b46d234d64a2cfa8f70bab5f1a9f8bcd97aa502fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00d1f7f784455f77516c396b46d234d64a2cfa8f70bab5f1a9f8bcd97aa502fd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Platinum
uzbek
127.0.0.1:14005
yzbekt.exe
-
reg_key
yzbekt.exe
-
splitter
|Ghost|
Targets
-
-
Target
00d1f7f784455f77516c396b46d234d64a2cfa8f70bab5f1a9f8bcd97aa502fd.exe
-
Size
65KB
-
MD5
129de086d65beaa64f4789c6f467fcd2
-
SHA1
c4f4b9c9a701dc64522ab7031aaa04bcb4e5f54e
-
SHA256
00d1f7f784455f77516c396b46d234d64a2cfa8f70bab5f1a9f8bcd97aa502fd
-
SHA512
7981172ebdf0083ca6ae34734c1993fc1aef667909e1daa08f4c9a236831da83cd73c4f4a9c7745870b430d6200620662797f1f7eba232b4574a06b81553d04b
-
SSDEEP
1536:tWOeboN36tbQviFw1ScTIBnvbBfLteF3nLrB9z3nWaF9bZS9vM:tWOeboN36tbQviFCtcBnVfWl9zGaF9bN
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-