General
-
Target
5d536406d735e27d910faf1813d79e0b.vbs
-
Size
151KB
-
Sample
211215-wlcensace6
-
MD5
5d536406d735e27d910faf1813d79e0b
-
SHA1
32f7716ddb61131917a90b83eb7fd74ce5eef16a
-
SHA256
887420d1dcca02056fb9b2aaffacaf87ac76d438fb4e4b9f244cde119db7ebc6
-
SHA512
1b797c0ada2656242d4017ecc33ce4045eece9a982cd4645e9e369e7d62ceed91e4f00ac14203077c349d8f815ed255d7fbe12742575e94f205bc319a9b365df
Static task
static1
Behavioral task
behavioral1
Sample
5d536406d735e27d910faf1813d79e0b.vbs
Resource
win7-en-20211208
Malware Config
Extracted
http://91.241.19.49/ramdes/DownloaderF3.txt
Extracted
http://91.241.19.49/ramdes/DownloaderF3.txt
Extracted
http://91.241.19.49/ramdes/DownloaderF3.txt
Extracted
njrat
0.7NC
NYAN CAT
njss.duckdns.org:57831
d51414327d6e
-
reg_key
d51414327d6e
-
splitter
@!#&^%$
Targets
-
-
Target
5d536406d735e27d910faf1813d79e0b.vbs
-
Size
151KB
-
MD5
5d536406d735e27d910faf1813d79e0b
-
SHA1
32f7716ddb61131917a90b83eb7fd74ce5eef16a
-
SHA256
887420d1dcca02056fb9b2aaffacaf87ac76d438fb4e4b9f244cde119db7ebc6
-
SHA512
1b797c0ada2656242d4017ecc33ce4045eece9a982cd4645e9e369e7d62ceed91e4f00ac14203077c349d8f815ed255d7fbe12742575e94f205bc319a9b365df
-
Async RAT payload
-
Blocklisted process makes network request
-
Drops startup file
-
Suspicious use of SetThreadContext
-