Behavioral task
behavioral1
Sample
tmp/19f2c7a2-d19a-4460-a410-88322dd21e60_onedrivenwt2.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
tmp/19f2c7a2-d19a-4460-a410-88322dd21e60_onedrivenwt2.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
tmp/19f2c7a2-d19a-4460-a410-88322dd21e60_onedrivenwt2.exe
-
Size
32KB
-
MD5
fa662f3db65d27282db066a3790e49ac
-
SHA1
4e172123c728811be644749ee4a3df6c03f78488
-
SHA256
5046403f44884fe6aa062f9d2f92037136305305ef195d4c213c279e2466ec1f
-
SHA512
6b426fafab9fe30dbdd1e4e8c388e285aed1e1902d1f0a0cf068e0a6ab28a9f095a50af402d5dbcc0f90de0b334d743fa9132b6625f4e00bd9bc56ed0e8fd28d
Malware Config
Extracted
Family
njrat
Version
0.7NC
Botnet
NYAN CAT
C2
musicnote.soundcast.me:117
Mutex
06ec5a2b0b9d
Attributes
-
reg_key
06ec5a2b0b9d
-
splitter
@!#&^%$
Signatures
-
Njrat family
Files
-
tmp/19f2c7a2-d19a-4460-a410-88322dd21e60_onedrivenwt2.exe.exe windows x86