General
-
Target
Payload.exe
-
Size
55KB
-
Sample
241219-2ejhasslbm
-
MD5
9207071fcd7c38c11ebc273ebffb9231
-
SHA1
ab0825aafcf4f674f5f58e4174a24e6589e7e5f1
-
SHA256
faba2545712ac8049dcc8f3a00ec2be9ab18bbf93f0cd4f8b7582505a3cfec88
-
SHA512
15b09fae18cdbcb519f516f777e4e17fd16711296dc37b43902fecb9fb2007a518b9b3821cc49fa8342351fb6a8a7d9aced2b1fe828f5caaac349bc6710d5267
-
SSDEEP
768:+Ba6lOt1Man8E2N6FikUt34okSN/mwFvfu0YMDHPsfL7XJSxI3pmSm:+B1cDnCN6FikSJDOwsNMD2XExI3pmSm
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payload.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
fat-pads.gl.at.ply.gg:35059
e564aa028dc627deeaa119b78ed54d5e
-
reg_key
e564aa028dc627deeaa119b78ed54d5e
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
Payload.exe
-
Size
55KB
-
MD5
9207071fcd7c38c11ebc273ebffb9231
-
SHA1
ab0825aafcf4f674f5f58e4174a24e6589e7e5f1
-
SHA256
faba2545712ac8049dcc8f3a00ec2be9ab18bbf93f0cd4f8b7582505a3cfec88
-
SHA512
15b09fae18cdbcb519f516f777e4e17fd16711296dc37b43902fecb9fb2007a518b9b3821cc49fa8342351fb6a8a7d9aced2b1fe828f5caaac349bc6710d5267
-
SSDEEP
768:+Ba6lOt1Man8E2N6FikUt34okSN/mwFvfu0YMDHPsfL7XJSxI3pmSm:+B1cDnCN6FikSJDOwsNMD2XExI3pmSm
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-