General
-
Target
ngrok.exe
-
Size
45.9MB
-
Sample
250122-sgxy2asrhn
-
MD5
108a2b2ace16b215f7bd1207be6b1498
-
SHA1
c98b8a1184c1195bced0b9f769943786052b303e
-
SHA256
8cbd5f9b1be18429ebd9e3fd0fe7152682848ed00d359eea9fbdb77840b076af
-
SHA512
c50443d25be2bd80f59545cb25577dcb3240d621bce511a063939baa084c1cef79f40a02414db90f4cc0efa7b751b808131c2b7014966b70a430f086d239985f
-
SSDEEP
393216:rYXEXR3uzMK0GWSFqlV3lYWmnHGm8mtGDfdJlU8Jq8tA9KxFxCfV:rYXEXhuzMmF26WmnHGrO1
Static task
static1
Behavioral task
behavioral1
Sample
ngrok.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ngrok.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
4.tcp.eu.ngrok.io:14149
a430c6a04cbb9e30925e7a0dad95dddc
-
reg_key
a430c6a04cbb9e30925e7a0dad95dddc
-
splitter
|'|'|
Targets
-
-
Target
ngrok.exe
-
Size
45.9MB
-
MD5
108a2b2ace16b215f7bd1207be6b1498
-
SHA1
c98b8a1184c1195bced0b9f769943786052b303e
-
SHA256
8cbd5f9b1be18429ebd9e3fd0fe7152682848ed00d359eea9fbdb77840b076af
-
SHA512
c50443d25be2bd80f59545cb25577dcb3240d621bce511a063939baa084c1cef79f40a02414db90f4cc0efa7b751b808131c2b7014966b70a430f086d239985f
-
SSDEEP
393216:rYXEXR3uzMK0GWSFqlV3lYWmnHGm8mtGDfdJlU8Jq8tA9KxFxCfV:rYXEXhuzMmF26WmnHGrO1
Score10/10-
Njrat family
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-