General
-
Target
384d1c067c56f4589f0d0b504b06f689cd798f2d76adf4f0617ef4653a4452dc
-
Size
106KB
-
Sample
241102-1acnhsvrbx
-
MD5
9aa88f2732efaab71a04d491bc7fb183
-
SHA1
e1f5f34b6edb47d4372b8f6ee12fec9b72b8b6d1
-
SHA256
384d1c067c56f4589f0d0b504b06f689cd798f2d76adf4f0617ef4653a4452dc
-
SHA512
1edf3c004851096a03f0d98a9b7f95365504c19d8674246adfe8f8721d88bf962ebb1293b342bd3d34bbe2f6c1f0b25b4117addb1d45aa7b64d99c46c91da2f3
-
SSDEEP
1536:yUwjMj8Zp6QObVqXNm9XYEv1nYR+P1aed/y4a4vU:JwtZp6QObXJR4EAed/na
Behavioral task
behavioral1
Sample
384d1c067c56f4589f0d0b504b06f689cd798f2d76adf4f0617ef4653a4452dc.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
384d1c067c56f4589f0d0b504b06f689cd798f2d76adf4f0617ef4653a4452dc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
comments-interventions.gl.at.ply.gg:43880
eff11e9a58052756b8705e34ce9e1d4f
-
reg_key
eff11e9a58052756b8705e34ce9e1d4f
-
splitter
|'|'|
Targets
-
-
Target
384d1c067c56f4589f0d0b504b06f689cd798f2d76adf4f0617ef4653a4452dc
-
Size
106KB
-
MD5
9aa88f2732efaab71a04d491bc7fb183
-
SHA1
e1f5f34b6edb47d4372b8f6ee12fec9b72b8b6d1
-
SHA256
384d1c067c56f4589f0d0b504b06f689cd798f2d76adf4f0617ef4653a4452dc
-
SHA512
1edf3c004851096a03f0d98a9b7f95365504c19d8674246adfe8f8721d88bf962ebb1293b342bd3d34bbe2f6c1f0b25b4117addb1d45aa7b64d99c46c91da2f3
-
SSDEEP
1536:yUwjMj8Zp6QObVqXNm9XYEv1nYR+P1aed/y4a4vU:JwtZp6QObXJR4EAed/na
-
Modifies Windows Firewall
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-