General
-
Target
Server.exe
-
Size
37KB
-
Sample
241118-xkxjwsxphl
-
MD5
795b0a8aa2ac4a21877b1d607044398b
-
SHA1
1dff34c9fca1a0c5b3ebc4373d07a077d786ca57
-
SHA256
171f09e74ab03fdb4ee1588296f216820fb8fde118d1f7ff65610ef02b72fea8
-
SHA512
1a348f2b5bf84472bebaa3b2532ee04decb4447d8a712b8ebadd2452e168988e06b191916d1aa32c176aa5bab2a68952c6542e5f56f6167c85eefe44e8b25256
-
SSDEEP
384:JmQkkmSiUBFgdnP12ywjrlSxbPF08uCXTrAF+rMRTyN/0L+EcoinblneHQM3epz8:sQkki91twjrlSheFCjrM+rMRa8Nu0/t
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
neger
mingrelian.duckdns.org:4444
65289bac35b428299fc3c65f033c35f1
-
reg_key
65289bac35b428299fc3c65f033c35f1
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
37KB
-
MD5
795b0a8aa2ac4a21877b1d607044398b
-
SHA1
1dff34c9fca1a0c5b3ebc4373d07a077d786ca57
-
SHA256
171f09e74ab03fdb4ee1588296f216820fb8fde118d1f7ff65610ef02b72fea8
-
SHA512
1a348f2b5bf84472bebaa3b2532ee04decb4447d8a712b8ebadd2452e168988e06b191916d1aa32c176aa5bab2a68952c6542e5f56f6167c85eefe44e8b25256
-
SSDEEP
384:JmQkkmSiUBFgdnP12ywjrlSxbPF08uCXTrAF+rMRTyN/0L+EcoinblneHQM3epz8:sQkki91twjrlSheFCjrM+rMRa8Nu0/t
-
Modifies Windows Firewall
-