General
-
Target
TEST2.ps1
-
Size
13KB
-
Sample
211116-sr6c6abdaq
-
MD5
b89d341ff7d766779f73981e85554e88
-
SHA1
d2d0125bfd5c4c98ad9e3dfed828d6278eb35a2f
-
SHA256
206f5a7cd8280a37396db687819a2b8d1f17bb46378260cd60421b047999c2e1
-
SHA512
c293fbf64ac72af88f13c7b4f8f2712d2ee49d60cd2f9043ac373b03e60faec0789aa2c100f5bd09229f99c882c5e76e7bacacae9d801f8a3ede6d73eaa55f7e
Static task
static1
Behavioral task
behavioral1
Sample
TEST2.ps1
Resource
win7-en-20211014
Malware Config
Extracted
https://cdn.discordapp.com/attachments/903998922576519211/909890026442195044/X1.jpg
https://cdn.discordapp.com/attachments/903998922576519211/909890023644610560/BYBY_1.jpg
Extracted
njrat
v2.0
|------[TEST)------|
new.libya2020.com.ly:2020
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
TEST2.ps1
-
Size
13KB
-
MD5
b89d341ff7d766779f73981e85554e88
-
SHA1
d2d0125bfd5c4c98ad9e3dfed828d6278eb35a2f
-
SHA256
206f5a7cd8280a37396db687819a2b8d1f17bb46378260cd60421b047999c2e1
-
SHA512
c293fbf64ac72af88f13c7b4f8f2712d2ee49d60cd2f9043ac373b03e60faec0789aa2c100f5bd09229f99c882c5e76e7bacacae9d801f8a3ede6d73eaa55f7e
Score10/10-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-