General
-
Target
2d5b9acf03b463406bfeabb01685234e030574f38b8db5fba35b1b61122e2fc4
-
Size
55KB
-
Sample
241113-zm1qfaslck
-
MD5
9e2820d95c9c4679ac7e5a59ed6dbbca
-
SHA1
d0fb293112ed0ca4bd8b47c460b432c83e520fef
-
SHA256
2d5b9acf03b463406bfeabb01685234e030574f38b8db5fba35b1b61122e2fc4
-
SHA512
31d2dd5d16a628a495c55acb7f4c4d191a60ac81326b24ea16524825f1255a3beaeca17bcabb5d400ec5e4345be7732b0e4e8f5d60103f5c2ca55cff635f4694
-
SSDEEP
768:vOOslSt1ManUk2NvPSmorcr3UwhkSN3mwFvfu0YMDHPs977XJSxI3pmum:vOvgDnqNvPSmtzDWwsNMDEXExI3pmum
Behavioral task
behavioral1
Sample
2d5b9acf03b463406bfeabb01685234e030574f38b8db5fba35b1b61122e2fc4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d5b9acf03b463406bfeabb01685234e030574f38b8db5fba35b1b61122e2fc4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
83aky1z.localto.net:6835
3a169f8f6ee6a0910570e1e4b3f5795e
-
reg_key
3a169f8f6ee6a0910570e1e4b3f5795e
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
2d5b9acf03b463406bfeabb01685234e030574f38b8db5fba35b1b61122e2fc4
-
Size
55KB
-
MD5
9e2820d95c9c4679ac7e5a59ed6dbbca
-
SHA1
d0fb293112ed0ca4bd8b47c460b432c83e520fef
-
SHA256
2d5b9acf03b463406bfeabb01685234e030574f38b8db5fba35b1b61122e2fc4
-
SHA512
31d2dd5d16a628a495c55acb7f4c4d191a60ac81326b24ea16524825f1255a3beaeca17bcabb5d400ec5e4345be7732b0e4e8f5d60103f5c2ca55cff635f4694
-
SSDEEP
768:vOOslSt1ManUk2NvPSmorcr3UwhkSN3mwFvfu0YMDHPs977XJSxI3pmum:vOvgDnqNvPSmtzDWwsNMDEXExI3pmum
Score10/10-
Njrat family
-
Drops startup file
-
Adds Run key to start application
-