General
-
Target
8f4045c3361edc62e06bd54604a4386699d032d854713dec6948b2e9cc7cf8bc
-
Size
23KB
-
Sample
241122-caal6axqcq
-
MD5
d1f939cf0e73184cc55b1613f8f714d3
-
SHA1
6029e0e38bb55c8cecd5addbf2b97dd1b873a047
-
SHA256
8f4045c3361edc62e06bd54604a4386699d032d854713dec6948b2e9cc7cf8bc
-
SHA512
de4f17b6af6bf4f954e3e2c6ab397cd36a380d0fe8a9d9503bbded614827292f65093fb38d446a59244c658b34fb9bcc3a28e975ea3fe3f7a34397462d81bf71
-
SSDEEP
384:5cqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZ4G:q30py6vhxaRpcnuk
Behavioral task
behavioral1
Sample
8f4045c3361edc62e06bd54604a4386699d032d854713dec6948b2e9cc7cf8bc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f4045c3361edc62e06bd54604a4386699d032d854713dec6948b2e9cc7cf8bc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
teste
0.tcp.sa.ngrok.io:11048
ed719d86ba27d032df6790b4103f925f
-
reg_key
ed719d86ba27d032df6790b4103f925f
-
splitter
|'|'|
Targets
-
-
Target
8f4045c3361edc62e06bd54604a4386699d032d854713dec6948b2e9cc7cf8bc
-
Size
23KB
-
MD5
d1f939cf0e73184cc55b1613f8f714d3
-
SHA1
6029e0e38bb55c8cecd5addbf2b97dd1b873a047
-
SHA256
8f4045c3361edc62e06bd54604a4386699d032d854713dec6948b2e9cc7cf8bc
-
SHA512
de4f17b6af6bf4f954e3e2c6ab397cd36a380d0fe8a9d9503bbded614827292f65093fb38d446a59244c658b34fb9bcc3a28e975ea3fe3f7a34397462d81bf71
-
SSDEEP
384:5cqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZ4G:q30py6vhxaRpcnuk
-
Njrat family
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-