General
-
Target
Server.exe
-
Size
93KB
-
Sample
241203-s8stdsxkgp
-
MD5
997c314aa305bf6cf42f3d9a17fa18af
-
SHA1
b1252e606043a1a37a84472f9ed715cab85ac3fb
-
SHA256
e434889a91f948654d30f9333b334c7cbd9169ab8f5c8b72e445a105a3261d0d
-
SHA512
55b7f1ae7bc640871c95ca516fcb84150fcbf9bc65260efdf5bda7167b04a2137e33a5710a94bb1c9fc0ca6cb741220e29295db1e89c46c6a9f1d98ef0966272
-
SSDEEP
1536:2hkJGOdXj/u1ByN/49jEwzGi1dDaDhgS:2hkjj/u1B6gKi1dMe
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
Pidoras
hakim32.ddns.net:2000
tool-seven.gl.at.ply.gg:52445
0c1bd31a645a324de8434492bf606073
-
reg_key
0c1bd31a645a324de8434492bf606073
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
93KB
-
MD5
997c314aa305bf6cf42f3d9a17fa18af
-
SHA1
b1252e606043a1a37a84472f9ed715cab85ac3fb
-
SHA256
e434889a91f948654d30f9333b334c7cbd9169ab8f5c8b72e445a105a3261d0d
-
SHA512
55b7f1ae7bc640871c95ca516fcb84150fcbf9bc65260efdf5bda7167b04a2137e33a5710a94bb1c9fc0ca6cb741220e29295db1e89c46c6a9f1d98ef0966272
-
SSDEEP
1536:2hkJGOdXj/u1ByN/49jEwzGi1dDaDhgS:2hkjj/u1B6gKi1dMe
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Drops startup file
-
Drops file in System32 directory
-