General
-
Target
80212787b7477e5d6c42781439c54bf42fa430337786db0dec2cb7039c0a1011.exe
-
Size
55KB
-
Sample
241126-pspv1s1nbx
-
MD5
5d57fd5e4c5fd0f7ee7015f6e86ff64b
-
SHA1
f57c2ffdba34947c804a33df0800059dc516c8b4
-
SHA256
80212787b7477e5d6c42781439c54bf42fa430337786db0dec2cb7039c0a1011
-
SHA512
40c4a0afae7dc9d48e54df8e27e3687bb4dbd25b9b3f6478937e6cfbc1ea54f652a5bb19a7cec509f6cf83f0397b5105d10a4becd4441f84c0b896b52a9ed39f
-
SSDEEP
1536:SXJYUmUYaB3Ky8ibpUfR/WViL8cIbJDLtffJ:WYe5EyNbkuVioBd9ffJ
Static task
static1
Behavioral task
behavioral1
Sample
80212787b7477e5d6c42781439c54bf42fa430337786db0dec2cb7039c0a1011.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
im523
1
172.0.0.1:11111
94.131.109.101:11111
bea40e08f77dcbe9528c9454b4346452
-
reg_key
bea40e08f77dcbe9528c9454b4346452
-
splitter
|'|'|
Targets
-
-
Target
80212787b7477e5d6c42781439c54bf42fa430337786db0dec2cb7039c0a1011.exe
-
Size
55KB
-
MD5
5d57fd5e4c5fd0f7ee7015f6e86ff64b
-
SHA1
f57c2ffdba34947c804a33df0800059dc516c8b4
-
SHA256
80212787b7477e5d6c42781439c54bf42fa430337786db0dec2cb7039c0a1011
-
SHA512
40c4a0afae7dc9d48e54df8e27e3687bb4dbd25b9b3f6478937e6cfbc1ea54f652a5bb19a7cec509f6cf83f0397b5105d10a4becd4441f84c0b896b52a9ed39f
-
SSDEEP
1536:SXJYUmUYaB3Ky8ibpUfR/WViL8cIbJDLtffJ:WYe5EyNbkuVioBd9ffJ
-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-