General
-
Target
138c8efb54944bf084d2a0e607593a84e0933f8fcd251713a37c49e175cec74e
-
Size
1.1MB
-
Sample
241222-wa899svnal
-
MD5
1f15727756acb812463a6030194dd0a5
-
SHA1
50f2654ebcc03db57fa562d163fde15a472ff6cb
-
SHA256
138c8efb54944bf084d2a0e607593a84e0933f8fcd251713a37c49e175cec74e
-
SHA512
85de789a6a1784a52a739a21e3cd1350242de0630c26d04978bc6b8be760fc7dd4d0775d3503169410d4b5e1882c69d7fa3ce8dc9111e36148e3c9ac8147ec89
-
SSDEEP
24576:tf30T0Ai5fKiCsfs4UjZgjRqu+I9M14VBUR:13Pof1KquTPVBU
Static task
static1
Behavioral task
behavioral1
Sample
138c8efb54944bf084d2a0e607593a84e0933f8fcd251713a37c49e175cec74e.exe
Resource
win7-20241010-en
Malware Config
Extracted
njrat
Hallaj PRO Rat [Fixed]
HacKed
rapist.ddns.net:444
8f2448f1f018757367d8a7d97c8d877e
-
reg_key
8f2448f1f018757367d8a7d97c8d877e
-
splitter
boolLove
Targets
-
-
Target
138c8efb54944bf084d2a0e607593a84e0933f8fcd251713a37c49e175cec74e
-
Size
1.1MB
-
MD5
1f15727756acb812463a6030194dd0a5
-
SHA1
50f2654ebcc03db57fa562d163fde15a472ff6cb
-
SHA256
138c8efb54944bf084d2a0e607593a84e0933f8fcd251713a37c49e175cec74e
-
SHA512
85de789a6a1784a52a739a21e3cd1350242de0630c26d04978bc6b8be760fc7dd4d0775d3503169410d4b5e1882c69d7fa3ce8dc9111e36148e3c9ac8147ec89
-
SSDEEP
24576:tf30T0Ai5fKiCsfs4UjZgjRqu+I9M14VBUR:13Pof1KquTPVBU
-
Njrat family
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-