General
-
Target
7afbab4dbc0296d849e6d1436377ece67d887dcaad96a364659f07d13cb8d1aaN
-
Size
1.1MB
-
Sample
241108-jdpc2sycjc
-
MD5
31b7afde2580800384c2b296a8c75cf0
-
SHA1
b701fa73bb8cea5df5039cc716b5c71f0a6ee398
-
SHA256
7afbab4dbc0296d849e6d1436377ece67d887dcaad96a364659f07d13cb8d1aa
-
SHA512
832adb6d32ec5c9c55340c86bc0bd2a051f845a810e1f245ab06de5073284eb67478b7e7b628607bbb48bf5397cf91d87687570db6d72d35b45edf2e45df0b6a
-
SSDEEP
24576:7r2f/NRiXPAtK2spGtZN3S56QDAUR3WTtwb:7r4/6XD2spKZN3S51DH
Static task
static1
Behavioral task
behavioral1
Sample
7afbab4dbc0296d849e6d1436377ece67d887dcaad96a364659f07d13cb8d1aaN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7afbab4dbc0296d849e6d1436377ece67d887dcaad96a364659f07d13cb8d1aaN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
MDAK
hakim32.ddns.net:2000
127.0.0.1:5552
d79a7bbe5ad7316f83f8657ce4d4b26d
-
reg_key
d79a7bbe5ad7316f83f8657ce4d4b26d
-
splitter
|'|'|
Targets
-
-
Target
7afbab4dbc0296d849e6d1436377ece67d887dcaad96a364659f07d13cb8d1aaN
-
Size
1.1MB
-
MD5
31b7afde2580800384c2b296a8c75cf0
-
SHA1
b701fa73bb8cea5df5039cc716b5c71f0a6ee398
-
SHA256
7afbab4dbc0296d849e6d1436377ece67d887dcaad96a364659f07d13cb8d1aa
-
SHA512
832adb6d32ec5c9c55340c86bc0bd2a051f845a810e1f245ab06de5073284eb67478b7e7b628607bbb48bf5397cf91d87687570db6d72d35b45edf2e45df0b6a
-
SSDEEP
24576:7r2f/NRiXPAtK2spGtZN3S56QDAUR3WTtwb:7r4/6XD2spKZN3S51DH
-
Njrat family
-
Modifies Windows Firewall
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Drops startup file
-
Drops desktop.ini file(s)
-