General
-
Target
6e93ed4c136f400b61c4e24df60db78ec58b51afb644ab1faffa9a956e4d5e67
-
Size
3.2MB
-
Sample
250124-cnsd5avjhy
-
MD5
12e67ca3b7338ca19dc628fa6ebecead
-
SHA1
a5874df0609b1d62fda0b92cc9764020bebe8718
-
SHA256
6e93ed4c136f400b61c4e24df60db78ec58b51afb644ab1faffa9a956e4d5e67
-
SHA512
2e80ec0cdb4ea19943698367140af43baeaabb1731ca072e6a404bfea2a79794b6a5f5bc478635956086dee68c1a62e51b2ff4bc56e43956108b01b6d00a0906
-
SSDEEP
98304:Zviz/27qWGq/TzuqCDl2Ptao7jCP5uNNh:Zviq75/TzufrwNh
Static task
static1
Behavioral task
behavioral1
Sample
6e93ed4c136f400b61c4e24df60db78ec58b51afb644ab1faffa9a956e4d5e67.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
0.tcp.ngrok.io:18315
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
6e93ed4c136f400b61c4e24df60db78ec58b51afb644ab1faffa9a956e4d5e67
-
Size
3.2MB
-
MD5
12e67ca3b7338ca19dc628fa6ebecead
-
SHA1
a5874df0609b1d62fda0b92cc9764020bebe8718
-
SHA256
6e93ed4c136f400b61c4e24df60db78ec58b51afb644ab1faffa9a956e4d5e67
-
SHA512
2e80ec0cdb4ea19943698367140af43baeaabb1731ca072e6a404bfea2a79794b6a5f5bc478635956086dee68c1a62e51b2ff4bc56e43956108b01b6d00a0906
-
SSDEEP
98304:Zviz/27qWGq/TzuqCDl2Ptao7jCP5uNNh:Zviq75/TzufrwNh
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-