General
-
Target
6d436e60c2fb29da147c14256bddd963
-
Size
208KB
-
Sample
211020-ra17faaadr
-
MD5
6d436e60c2fb29da147c14256bddd963
-
SHA1
196830c4cee77e799789001c65b866ef7755e250
-
SHA256
9fad723dade78cd386645103e1683620b5d1f03b17ae358bdb176c61c3a641fe
-
SHA512
3c0200f49aa036c1e148da156bf9e21b3c071c51e7624d5774da6a51bde46e7cf15af0dc1d1c599b7c76619833165f60aa44edb110ccc058aa1b62dce2f33e9c
Static task
static1
Behavioral task
behavioral1
Sample
6d436e60c2fb29da147c14256bddd963.exe
Resource
win7-en-20211014
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
titopeo1.duckdns.org:9780
42fbf86d0d6541e3b
-
reg_key
42fbf86d0d6541e3b
-
splitter
@!#&^%$
Targets
-
-
Target
6d436e60c2fb29da147c14256bddd963
-
Size
208KB
-
MD5
6d436e60c2fb29da147c14256bddd963
-
SHA1
196830c4cee77e799789001c65b866ef7755e250
-
SHA256
9fad723dade78cd386645103e1683620b5d1f03b17ae358bdb176c61c3a641fe
-
SHA512
3c0200f49aa036c1e148da156bf9e21b3c071c51e7624d5774da6a51bde46e7cf15af0dc1d1c599b7c76619833165f60aa44edb110ccc058aa1b62dce2f33e9c
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Suspicious use of SetThreadContext
-