General
-
Target
aae4a82e65e47dc719affd7bebb7cc9ce1095fefeb3039947c1375688f2a4423
-
Size
991KB
-
Sample
210930-lnrl9shba2
-
MD5
71cf0b826a586a2c77eacfde791ec14e
-
SHA1
349a63989b801e1b9dee0960040ef7def96e28f6
-
SHA256
aae4a82e65e47dc719affd7bebb7cc9ce1095fefeb3039947c1375688f2a4423
-
SHA512
eb7f487097dea3d90740bcb7751ea581a03a76c3e335a931515e3f66f7db94877587872a2bf385ee8d926283feee4ce151cdba22a77abcb3daa2ead0199d7171
Static task
static1
Behavioral task
behavioral1
Sample
aae4a82e65e47dc719affd7bebb7cc9ce1095fefeb3039947c1375688f2a4423.exe
Resource
win7-en-20210920
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
septiembre2.duckdns.org:6633
a2951ca84e184
-
reg_key
a2951ca84e184
-
splitter
@!#&^%$
Targets
-
-
Target
aae4a82e65e47dc719affd7bebb7cc9ce1095fefeb3039947c1375688f2a4423
-
Size
991KB
-
MD5
71cf0b826a586a2c77eacfde791ec14e
-
SHA1
349a63989b801e1b9dee0960040ef7def96e28f6
-
SHA256
aae4a82e65e47dc719affd7bebb7cc9ce1095fefeb3039947c1375688f2a4423
-
SHA512
eb7f487097dea3d90740bcb7751ea581a03a76c3e335a931515e3f66f7db94877587872a2bf385ee8d926283feee4ce151cdba22a77abcb3daa2ead0199d7171
-
Suspicious use of SetThreadContext
-