General
-
Target
c4a07f7612b822a1c6e6879ba5dcc5de.exe
-
Size
209KB
-
Sample
250102-k8eb1avpay
-
MD5
c4a07f7612b822a1c6e6879ba5dcc5de
-
SHA1
09d44c896d14e7df8d8da0d938235ee33c9b2281
-
SHA256
391d3357c3e07d6444f6cd189f68d748c52444c30d3dd68282c50acf62e5db72
-
SHA512
27c07202d83ac4593e1f734480f735e2b4d02bac4646211756eb852267aff8c1acbe974161c93ac6baf1981ad669b5a30f4d320bc26f4f1d1e71b2ed1dc90058
-
SSDEEP
3072:rR2EJHNNObrQy5y6GrEHBAnpK37nX9840BQ5f74tyJhcMKNFhHF+bs5iRXr:124NMbrQy7L8c0Fpgs5iJ
Static task
static1
Behavioral task
behavioral1
Sample
c4a07f7612b822a1c6e6879ba5dcc5de.exe
Resource
win7-20240729-en
Malware Config
Extracted
njrat
0.7d
ByABOLHB
abolhb.com:505
165d6ed988ac
-
reg_key
165d6ed988ac
-
splitter
|'|'|
Targets
-
-
Target
c4a07f7612b822a1c6e6879ba5dcc5de.exe
-
Size
209KB
-
MD5
c4a07f7612b822a1c6e6879ba5dcc5de
-
SHA1
09d44c896d14e7df8d8da0d938235ee33c9b2281
-
SHA256
391d3357c3e07d6444f6cd189f68d748c52444c30d3dd68282c50acf62e5db72
-
SHA512
27c07202d83ac4593e1f734480f735e2b4d02bac4646211756eb852267aff8c1acbe974161c93ac6baf1981ad669b5a30f4d320bc26f4f1d1e71b2ed1dc90058
-
SSDEEP
3072:rR2EJHNNObrQy5y6GrEHBAnpK37nX9840BQ5f74tyJhcMKNFhHF+bs5iRXr:124NMbrQy7L8c0Fpgs5iJ
-
Njrat family
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-