General
-
Target
63ea07828dc4a630118822a995ba76bc25e66539fbe897c3b12a53df8c74b590.exe
-
Size
749KB
-
Sample
241129-fs21xaxlcs
-
MD5
764342f536b37eb0afd7deb9ecd2ae75
-
SHA1
f0e4687a52f433ee41344017eb97cea58ba54e53
-
SHA256
63ea07828dc4a630118822a995ba76bc25e66539fbe897c3b12a53df8c74b590
-
SHA512
97e541f8de4bf7434c6fef0addee2526bea24e2c9f43494115e55b01a7805f42ef76a471ef7458f5a851441c519afc678971dbf1b6f4ad7cf26796890fbde288
-
SSDEEP
12288:bcsCELA+12Hd5lpvS36pDfi/xN3xb2GzmtVzxWWx0GKl/yCQwEyC+oHRf4kzGhkh:5zmrzxWjGKl/WhOoxw0
Static task
static1
Behavioral task
behavioral1
Sample
63ea07828dc4a630118822a995ba76bc25e66539fbe897c3b12a53df8c74b590.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
v4.0
HacKed
103.186.117.182:7788
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
63ea07828dc4a630118822a995ba76bc25e66539fbe897c3b12a53df8c74b590.exe
-
Size
749KB
-
MD5
764342f536b37eb0afd7deb9ecd2ae75
-
SHA1
f0e4687a52f433ee41344017eb97cea58ba54e53
-
SHA256
63ea07828dc4a630118822a995ba76bc25e66539fbe897c3b12a53df8c74b590
-
SHA512
97e541f8de4bf7434c6fef0addee2526bea24e2c9f43494115e55b01a7805f42ef76a471ef7458f5a851441c519afc678971dbf1b6f4ad7cf26796890fbde288
-
SSDEEP
12288:bcsCELA+12Hd5lpvS36pDfi/xN3xb2GzmtVzxWWx0GKl/yCQwEyC+oHRf4kzGhkh:5zmrzxWjGKl/WhOoxw0
-
Njrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-