General
-
Target
Server.exe
-
Size
93KB
-
Sample
250329-mvx83atj19
-
MD5
be8230b1a5ba47dacb5b4d4f990f0da2
-
SHA1
1c44f6422cdf7117c69ab172625eee8d8a561159
-
SHA256
c7bd3056f1c01d0d36cd4ee675677f9dd20be0684fe8520f18df7d303c494e94
-
SHA512
26176c2277701fc6b2dd568cb7e9448a83ebfb4f4394469e24ed44511870b3d57e1cd6b6bbe8a305f2bebb7c701330a5be2e37b1f35c19055f43f640c879e402
-
SSDEEP
1536:NUwC+xhUa9urgOBPmNvMcjEwzGi1dDGDIgS:NUmUa9urgOkdCi1dYx
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Server.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
2.tcp.eu.ngrok.io:19281
1611d7b8bf80b0aaf61e5b786e58a4b5
-
reg_key
1611d7b8bf80b0aaf61e5b786e58a4b5
-
splitter
|'|'|
Targets
-
-
Target
Server.exe
-
Size
93KB
-
MD5
be8230b1a5ba47dacb5b4d4f990f0da2
-
SHA1
1c44f6422cdf7117c69ab172625eee8d8a561159
-
SHA256
c7bd3056f1c01d0d36cd4ee675677f9dd20be0684fe8520f18df7d303c494e94
-
SHA512
26176c2277701fc6b2dd568cb7e9448a83ebfb4f4394469e24ed44511870b3d57e1cd6b6bbe8a305f2bebb7c701330a5be2e37b1f35c19055f43f640c879e402
-
SSDEEP
1536:NUwC+xhUa9urgOBPmNvMcjEwzGi1dDGDIgS:NUmUa9urgOkdCi1dYx
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-