General
-
Target
9fb660eca8d9ed1038a8cffc032e59bb.vbs
-
Size
151KB
-
Sample
211217-ztb1nafaar
-
MD5
9fb660eca8d9ed1038a8cffc032e59bb
-
SHA1
4aff5b55b1b499cec665f46b132856a4a300b4e9
-
SHA256
2a196da9c5e2dcf30d7eb90464a4296bc1f0046958836157c07ab4782e5af108
-
SHA512
0bcb0de54a3bdbe9d0e2be1899ab05060a7db58ae6e53aeed82a54b99f126502e0366415e590f22909aa9531c272af8287c6d5f06ece31de21156bcc2ef81790
Static task
static1
Behavioral task
behavioral1
Sample
9fb660eca8d9ed1038a8cffc032e59bb.vbs
Resource
win7-en-20211208
Malware Config
Extracted
http://91.241.19.49/ramdes/DownloaderF3.txt
Extracted
njrat
0.7NC
NYAN CAT
revg.duckdns.org:57831
ebef4abe57d24e8
-
reg_key
ebef4abe57d24e8
-
splitter
@!#&^%$
Targets
-
-
Target
9fb660eca8d9ed1038a8cffc032e59bb.vbs
-
Size
151KB
-
MD5
9fb660eca8d9ed1038a8cffc032e59bb
-
SHA1
4aff5b55b1b499cec665f46b132856a4a300b4e9
-
SHA256
2a196da9c5e2dcf30d7eb90464a4296bc1f0046958836157c07ab4782e5af108
-
SHA512
0bcb0de54a3bdbe9d0e2be1899ab05060a7db58ae6e53aeed82a54b99f126502e0366415e590f22909aa9531c272af8287c6d5f06ece31de21156bcc2ef81790
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Blocklisted process makes network request
-
Drops startup file
-
Suspicious use of SetThreadContext
-