General
-
Target
e0c85e56056a0a1bb926856b7930367fee168c6591cc7e48660607259b4a9774.exe
-
Size
40KB
-
Sample
241219-jmpp6swmdn
-
MD5
19b6cc62aec3fb6f57af96e8aa08e34a
-
SHA1
3fa40a227a903e02384f30f097a659d62ef7a474
-
SHA256
e0c85e56056a0a1bb926856b7930367fee168c6591cc7e48660607259b4a9774
-
SHA512
2924a655f8afaa4f8d8319e8b674d51d30fea8f9be901632d9c6cb9ee6f35b083959803e5caad6d8506a6ed7b1aaede5784de63b525fa011695183beff8ebce8
-
SSDEEP
768:U4lD80GLtVB8TCbH9PRwxAtz/MfHiedUYOTAhe9j/9Vc:UuD8LtVB80FOWtz/MvRO9jfc
Static task
static1
Behavioral task
behavioral1
Sample
e0c85e56056a0a1bb926856b7930367fee168c6591cc7e48660607259b4a9774.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
QUJPTEhC
ByABOLHB
abolhb.com:505
66f73d9b4e94d115b763eaa1ada7d1f1
-
reg_key
66f73d9b4e94d115b763eaa1ada7d1f1
-
splitter
|'|'|
Targets
-
-
Target
e0c85e56056a0a1bb926856b7930367fee168c6591cc7e48660607259b4a9774.exe
-
Size
40KB
-
MD5
19b6cc62aec3fb6f57af96e8aa08e34a
-
SHA1
3fa40a227a903e02384f30f097a659d62ef7a474
-
SHA256
e0c85e56056a0a1bb926856b7930367fee168c6591cc7e48660607259b4a9774
-
SHA512
2924a655f8afaa4f8d8319e8b674d51d30fea8f9be901632d9c6cb9ee6f35b083959803e5caad6d8506a6ed7b1aaede5784de63b525fa011695183beff8ebce8
-
SSDEEP
768:U4lD80GLtVB8TCbH9PRwxAtz/MfHiedUYOTAhe9j/9Vc:UuD8LtVB80FOWtz/MvRO9jfc
-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-