General
-
Target
Server.exe
-
Size
93KB
-
Sample
241222-fsaxesvngn
-
MD5
3f3ae3a450723c80b1aaff419e0d1369
-
SHA1
bb3e89cde4dd9d29a688b25a0002163540555b6d
-
SHA256
8d4c9b97cae0f3c35ab9a5ffa7f1ab45f7c304fb0d7c517828fed0c2048f6d4a
-
SHA512
81cfe00bfb7ff567b66747937c37ee846ae8a672dd3be573b013bc431c2d7d9602f7c02f568a3c996cefc2f86ca9597bc64e9f615b3ef7aae45360e3d15f6aab
-
SSDEEP
768:QY33lgSRmnldjcRoMwrx7Y+DIkIITJbXX0pOt8ux82SXxrjEtCdnl2pi1Rz4Rk33:PlTmlbrq+1NTZ0OMjEwzGi1dDzDXgS
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win11-20241007-en
Malware Config
Extracted
njrat
0.7d
loh
hakim32.ddns.net:2000
6.tcp.eu.ngrok.io:11237
9a1d999f2150f6d33406593daec54346
-
reg_key
9a1d999f2150f6d33406593daec54346
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
93KB
-
MD5
3f3ae3a450723c80b1aaff419e0d1369
-
SHA1
bb3e89cde4dd9d29a688b25a0002163540555b6d
-
SHA256
8d4c9b97cae0f3c35ab9a5ffa7f1ab45f7c304fb0d7c517828fed0c2048f6d4a
-
SHA512
81cfe00bfb7ff567b66747937c37ee846ae8a672dd3be573b013bc431c2d7d9602f7c02f568a3c996cefc2f86ca9597bc64e9f615b3ef7aae45360e3d15f6aab
-
SSDEEP
768:QY33lgSRmnldjcRoMwrx7Y+DIkIITJbXX0pOt8ux82SXxrjEtCdnl2pi1Rz4Rk33:PlTmlbrq+1NTZ0OMjEwzGi1dDzDXgS
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-