General
-
Target
Invoice_and_payment_copy.vbs
-
Size
5KB
-
Sample
210911-dv548sagg8
-
MD5
83b9414820f37287d526b16da3c6e6d9
-
SHA1
9afab0d39520db7e8754ac5c9e27f7d73220d27c
-
SHA256
d0b59cba5f88973dfeea8610926e26b61b4c25125bfd8168954e9dd87d6b132d
-
SHA512
1879f8dc3087a0a5e3a4b7f21ef210fe8278117ef687fac45ccd0d71e63ef6b9a621a036b222fc5bf6ad007df76bc6d0ec3f8c3f6b7dcd20dcad6fc31b945fb1
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_and_payment_copy.vbs
Resource
win7-en
Malware Config
Extracted
http://54.184.87.30/Dbypass.txt
Extracted
njrat
v4.0
Boss
103.147.184.73:7103
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
Invoice_and_payment_copy.vbs
-
Size
5KB
-
MD5
83b9414820f37287d526b16da3c6e6d9
-
SHA1
9afab0d39520db7e8754ac5c9e27f7d73220d27c
-
SHA256
d0b59cba5f88973dfeea8610926e26b61b4c25125bfd8168954e9dd87d6b132d
-
SHA512
1879f8dc3087a0a5e3a4b7f21ef210fe8278117ef687fac45ccd0d71e63ef6b9a621a036b222fc5bf6ad007df76bc6d0ec3f8c3f6b7dcd20dcad6fc31b945fb1
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-