General
-
Target
7812344ebb0aed20fb8cd932ad7c7c019dccb813956a1a5dd9f94bf6af82d50a.exe
-
Size
31KB
-
Sample
241217-dxqsbsypcx
-
MD5
a2d2fc6108063a466264a34e7c46c8a3
-
SHA1
ddab38e1dcf749d355bf63a0eb25ce844db1d880
-
SHA256
7812344ebb0aed20fb8cd932ad7c7c019dccb813956a1a5dd9f94bf6af82d50a
-
SHA512
2d34d5c75f2cdad94fa957c80d71f697b2fb9bd949e25d9035234c9c7a37f00fd8d92b3e7c17c84a2a65b9b4893f1336850722e4111244f2d70e0cc1eaa44145
-
SSDEEP
768:gjMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0tiX7j:3kKdisvQVk+j
Behavioral task
behavioral1
Sample
7812344ebb0aed20fb8cd932ad7c7c019dccb813956a1a5dd9f94bf6af82d50a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7812344ebb0aed20fb8cd932ad7c7c019dccb813956a1a5dd9f94bf6af82d50a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
Enai
6.tcp.eu.ngrok.io:14377
bd898fbb4a2356e019689e2e64340d76
-
reg_key
bd898fbb4a2356e019689e2e64340d76
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
7812344ebb0aed20fb8cd932ad7c7c019dccb813956a1a5dd9f94bf6af82d50a.exe
-
Size
31KB
-
MD5
a2d2fc6108063a466264a34e7c46c8a3
-
SHA1
ddab38e1dcf749d355bf63a0eb25ce844db1d880
-
SHA256
7812344ebb0aed20fb8cd932ad7c7c019dccb813956a1a5dd9f94bf6af82d50a
-
SHA512
2d34d5c75f2cdad94fa957c80d71f697b2fb9bd949e25d9035234c9c7a37f00fd8d92b3e7c17c84a2a65b9b4893f1336850722e4111244f2d70e0cc1eaa44145
-
SSDEEP
768:gjMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0tiX7j:3kKdisvQVk+j
-
Njrat family
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-