General
-
Target
RFQ-474552121.PDF.vbs
-
Size
703KB
-
Sample
211019-r4qmssghep
-
MD5
cd9e1d38735dac32cc6d16d56f77e245
-
SHA1
9d0e49e52bca6b5d31e0a40775c7f1dcef782357
-
SHA256
6b3856d5dfd5daf70c0866277b3da2471fafe302698fd7858cacb074edcc83b0
-
SHA512
c31ed9bd8788dea045b04752cbbde230f239eba8784204920e6b0aeeca3be495927c9e1d96477d2ee09721645fe5076bc43cbfa9537b2394a4a8fd3aa57f3f21
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-474552121.PDF.vbs
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
RFQ-474552121.PDF.vbs
Resource
win10-en-20211014
Malware Config
Extracted
njrat
v2.0
------(FaceBook)------
new.libya2020.com.ly:2020
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
RFQ-474552121.PDF.vbs
-
Size
703KB
-
MD5
cd9e1d38735dac32cc6d16d56f77e245
-
SHA1
9d0e49e52bca6b5d31e0a40775c7f1dcef782357
-
SHA256
6b3856d5dfd5daf70c0866277b3da2471fafe302698fd7858cacb074edcc83b0
-
SHA512
c31ed9bd8788dea045b04752cbbde230f239eba8784204920e6b0aeeca3be495927c9e1d96477d2ee09721645fe5076bc43cbfa9537b2394a4a8fd3aa57f3f21
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-