General
-
Target
Shipment#45523666245.vbs
-
Size
15KB
-
Sample
211029-xbt3eaaefn
-
MD5
b671f9ee1edb1e6f2911c22c4e6ebbaf
-
SHA1
6de6dfee5b87a8f52ce34bc0c9d147bc69faa04e
-
SHA256
313bb9d87b5bbdc4cc164ee429b41bcac1605401e1c3e7fa8d1fa287277e3cce
-
SHA512
15f4ed29c203cf9a2da50b5df6d898e79feb08cf9ddc0ab7c315eeab9038745743e5352dc2db5197c3bf3817d26590bf4adc21a91a68fd2dcd633e3712fa4832
Static task
static1
Behavioral task
behavioral1
Sample
Shipment#45523666245.vbs
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Shipment#45523666245.vbs
Resource
win10-en-20210920
Malware Config
Extracted
njrat
v2.0
------(MEILLLER)------
new.libya2020.com.ly:2020
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
Shipment#45523666245.vbs
-
Size
15KB
-
MD5
b671f9ee1edb1e6f2911c22c4e6ebbaf
-
SHA1
6de6dfee5b87a8f52ce34bc0c9d147bc69faa04e
-
SHA256
313bb9d87b5bbdc4cc164ee429b41bcac1605401e1c3e7fa8d1fa287277e3cce
-
SHA512
15f4ed29c203cf9a2da50b5df6d898e79feb08cf9ddc0ab7c315eeab9038745743e5352dc2db5197c3bf3817d26590bf4adc21a91a68fd2dcd633e3712fa4832
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-