General
-
Target
New Client.exe
-
Size
167KB
-
Sample
241222-aydmlswnam
-
MD5
d3829ddb2ab4d31749f4e44726873818
-
SHA1
ac86aad0ab079208ef1c5293b306e4022336bb3a
-
SHA256
de7a825e9b99a298701c964a202485ee3ca8c3703f40eaf824f465aa5b259409
-
SHA512
d3e4e55bd098ffae2435bac507bf02a89e2dee56dd04c86de91634b792bb808b5f69e66ebd51f70f5b6cc3c783c07b5b14f14e09526433498b43b0d891781d75
-
SSDEEP
3072:WNMADoN36tnQviFCtABnKfWl9z6aF9byYvMJUJ8T2SXZyrgoBJtbN/3MCK2kevEz:Wmi9zRvM1/JdSI5eb
Behavioral task
behavioral1
Sample
New Client.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Platinum
HacKed
127.0.0.1:14324
discord.exe
-
reg_key
discord.exe
-
splitter
|Ghost|
Targets
-
-
Target
New Client.exe
-
Size
167KB
-
MD5
d3829ddb2ab4d31749f4e44726873818
-
SHA1
ac86aad0ab079208ef1c5293b306e4022336bb3a
-
SHA256
de7a825e9b99a298701c964a202485ee3ca8c3703f40eaf824f465aa5b259409
-
SHA512
d3e4e55bd098ffae2435bac507bf02a89e2dee56dd04c86de91634b792bb808b5f69e66ebd51f70f5b6cc3c783c07b5b14f14e09526433498b43b0d891781d75
-
SSDEEP
3072:WNMADoN36tnQviFCtABnKfWl9z6aF9byYvMJUJ8T2SXZyrgoBJtbN/3MCK2kevEz:Wmi9zRvM1/JdSI5eb
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-