General
-
Target
9caf7f30a4c05e494861099f3d883851850d3b0f66d08fd01f1b9abc049bcb07
-
Size
552KB
-
Sample
241104-c6xfsszrez
-
MD5
78e3045f72689b705ce806b206363733
-
SHA1
3033541dfb593c52c9975ea919041e087610b468
-
SHA256
9caf7f30a4c05e494861099f3d883851850d3b0f66d08fd01f1b9abc049bcb07
-
SHA512
289193a3d43d1c09ba1fb809b279b7c4de7bfae2068bff187815cd72bc0b3c098cda4a302ab3e3738214f2b99a76244d586712a905fbb4424ea425b596a52921
-
SSDEEP
12288:R32kYn9YFZBsws0rwfQpP9p/yFUk6l6X3cWCauQWannR8fj:RGk69IS0rw4pP9p416QMaBnRCj
Static task
static1
Behavioral task
behavioral1
Sample
9caf7f30a4c05e494861099f3d883851850d3b0f66d08fd01f1b9abc049bcb07.exe
Resource
win7-20241010-en
Malware Config
Extracted
njrat
0.7.3
OCT
film.royalprop.trade:8109
update.exe
-
reg_key
update.exe
-
splitter
0987
Targets
-
-
Target
9caf7f30a4c05e494861099f3d883851850d3b0f66d08fd01f1b9abc049bcb07
-
Size
552KB
-
MD5
78e3045f72689b705ce806b206363733
-
SHA1
3033541dfb593c52c9975ea919041e087610b468
-
SHA256
9caf7f30a4c05e494861099f3d883851850d3b0f66d08fd01f1b9abc049bcb07
-
SHA512
289193a3d43d1c09ba1fb809b279b7c4de7bfae2068bff187815cd72bc0b3c098cda4a302ab3e3738214f2b99a76244d586712a905fbb4424ea425b596a52921
-
SSDEEP
12288:R32kYn9YFZBsws0rwfQpP9p/yFUk6l6X3cWCauQWannR8fj:RGk69IS0rw4pP9p416QMaBnRCj
-
Njrat family
-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-