General
-
Target
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe
-
Size
237KB
-
Sample
250201-2tj3datpct
-
MD5
ad1227c52b7d062fa428778f60188be4
-
SHA1
ffa2bbbbab19fb7a28ccbfc8e96b0c94c85b0df8
-
SHA256
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9
-
SHA512
d2d8188f451d645d0283e8938e5063f1e5ff22c6af550f003382ae33f63513062fafb4622a60e98f9fd1bdc00a484024888846e71392447bf4c2811e2a7079bb
-
SSDEEP
3072:F/ItRZp06PJHbIxs+VGSYzlg+lAMSpBV4W/E+z1IQwqznHpYQ5czMWDBoWkb7RKI:zs+V7s6+l+yWD+QwqzHqQk27PJES
Static task
static1
Behavioral task
behavioral1
Sample
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
njrat
0.6.4
HacKed
payment-rivers.gl.at.ply.gg:15267
392725c4d836f07a62148783f8b913f2
-
reg_key
392725c4d836f07a62148783f8b913f2
-
splitter
|'|'|
Targets
-
-
Target
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9.exe
-
Size
237KB
-
MD5
ad1227c52b7d062fa428778f60188be4
-
SHA1
ffa2bbbbab19fb7a28ccbfc8e96b0c94c85b0df8
-
SHA256
23d0adb6665c8d31b2f2f646aec6ff3507eeab0683e963ddf5e3bce40b9593f9
-
SHA512
d2d8188f451d645d0283e8938e5063f1e5ff22c6af550f003382ae33f63513062fafb4622a60e98f9fd1bdc00a484024888846e71392447bf4c2811e2a7079bb
-
SSDEEP
3072:F/ItRZp06PJHbIxs+VGSYzlg+lAMSpBV4W/E+z1IQwqznHpYQ5czMWDBoWkb7RKI:zs+V7s6+l+yWD+QwqzHqQk27PJES
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-