General
-
Target
900b9c744b8519061ba55671ae1589cd215f1189eb64fc170cc7889196a53c78.bin.sample.gz
-
Size
11KB
-
Sample
211028-1k5gaahacq
-
MD5
03170c51b974935bda09cfdfe9c50ad7
-
SHA1
f7654a348a9afc6f888e0d7e7560ee3bf99eadd3
-
SHA256
01ed7a66bff8a0ab10c7e63fd6dee79b97f79e321648d8be9b8c374cbb998a22
-
SHA512
8632d344a82dbca81d6e201265fcc8296f9831b6840acd8cd1830fba752c0666c9f5176708a4270eab69e66abc466e1b45cdfc573946159a945ed7a2b1aa1e7c
Static task
static1
Behavioral task
behavioral1
Sample
sample.vbs
Resource
win7-en-20211014
Malware Config
Extracted
njrat
0.7d
Now
top.killwhenabusing1.xyz:2004
6db98419ccbf0cb5969083f3317130d0
-
reg_key
6db98419ccbf0cb5969083f3317130d0
-
splitter
|'|'|
Targets
-
-
Target
sample
-
Size
117KB
-
MD5
be2c337fdf0551ffc4abfe4385599421
-
SHA1
0852bd21f78d09729385358f6db9d314899ffdf4
-
SHA256
900b9c744b8519061ba55671ae1589cd215f1189eb64fc170cc7889196a53c78
-
SHA512
7196b87b7523989157131842afd70b9943d3c446e891ea7f270b2eee9f58601be8f443838b34a3d29c1fff430c8b91d40b431c541f7ce6e2ac7b9abd2fce0773
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Blocklisted process makes network request
-
Modifies Windows Firewall
-
Drops startup file
-
Suspicious use of SetThreadContext
-