General
-
Target
WindowsApp1.exe
-
Size
477KB
-
Sample
250112-nvst1s1kfv
-
MD5
b5861d91a75a20e8811cefea4af1fe18
-
SHA1
07defcf78334ffd145cdb4ff2e1163e257c4b957
-
SHA256
5acde150ebdddc2fc69833d95691746d5c471dc08e74fe0aeb96d06670a536e7
-
SHA512
072486eca2641fbb5efa4411a067d6c0658e71aed9a2521dd5e5321fab9ee490dfce0b11ea9c008ac054a007be5a8c2801c5a79662c30e984a756e8e7f26722a
-
SSDEEP
12288:fqNB6ENSUO91dS039TrZgrirZXe1i709aEUpRegYyLs:+QEoUO3dS0tTxXeQ70W3
Static task
static1
Behavioral task
behavioral1
Sample
WindowsApp1.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
F9t family
japanese-cross.gl.at.ply.gg:16828
0ecb0ae2cd4872c3a8e9ee19da99e4b8
-
reg_key
0ecb0ae2cd4872c3a8e9ee19da99e4b8
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
WindowsApp1.exe
-
Size
477KB
-
MD5
b5861d91a75a20e8811cefea4af1fe18
-
SHA1
07defcf78334ffd145cdb4ff2e1163e257c4b957
-
SHA256
5acde150ebdddc2fc69833d95691746d5c471dc08e74fe0aeb96d06670a536e7
-
SHA512
072486eca2641fbb5efa4411a067d6c0658e71aed9a2521dd5e5321fab9ee490dfce0b11ea9c008ac054a007be5a8c2801c5a79662c30e984a756e8e7f26722a
-
SSDEEP
12288:fqNB6ENSUO91dS039TrZgrirZXe1i709aEUpRegYyLs:+QEoUO3dS0tTxXeQ70W3
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-