General
-
Target
56baefa1714681b34047b80ba4fe073084a9a23c9317a4d23e24c472384d7eb4N.exe
-
Size
39KB
-
Sample
250205-ets9qa1jhn
-
MD5
e72719029d1131e178d63e7591086f10
-
SHA1
60a771314435505d4395ed3928283e902cf6d8a3
-
SHA256
56baefa1714681b34047b80ba4fe073084a9a23c9317a4d23e24c472384d7eb4
-
SHA512
969979ada1a12e6b3541cee3c5427a8967867d0e0eebc790c169bcac46cab545c2d1f8307eb2c7ba7c89e8e8d0b75f8a570916a4920ac450ba0a0e7104773300
-
SSDEEP
768:VvAmeTEwwQWpZ/s50OdUZGUOkNNZ0JEyK08WT50UvY2:iBAB1sN4pNgSyTBXl
Static task
static1
Behavioral task
behavioral1
Sample
56baefa1714681b34047b80ba4fe073084a9a23c9317a4d23e24c472384d7eb4N.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
Platinum
HacKed
127.0.0.1:4444
rshgfdgrarsft.exe
-
reg_key
rshgfdgrarsft.exe
-
splitter
|Ghost|
Targets
-
-
Target
56baefa1714681b34047b80ba4fe073084a9a23c9317a4d23e24c472384d7eb4N.exe
-
Size
39KB
-
MD5
e72719029d1131e178d63e7591086f10
-
SHA1
60a771314435505d4395ed3928283e902cf6d8a3
-
SHA256
56baefa1714681b34047b80ba4fe073084a9a23c9317a4d23e24c472384d7eb4
-
SHA512
969979ada1a12e6b3541cee3c5427a8967867d0e0eebc790c169bcac46cab545c2d1f8307eb2c7ba7c89e8e8d0b75f8a570916a4920ac450ba0a0e7104773300
-
SSDEEP
768:VvAmeTEwwQWpZ/s50OdUZGUOkNNZ0JEyK08WT50UvY2:iBAB1sN4pNgSyTBXl
Score10/10-
Njrat family
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-