General
-
Target
P48274Q89.vbs
-
Size
872B
-
Sample
211221-j7wdfscfb3
-
MD5
028b34eb17d379cf3688e72225cd95da
-
SHA1
851db5268715999fc8db2d6292096d19e3830d3b
-
SHA256
29bd0ab3b7cb939a7def1c4e4bb78c3c9d7e19d580e6292b155e89b13820309f
-
SHA512
8e1be3d7de63e20e5d8737486b123dff598894bab17f15e69e2ac0f648e4d52b81e261aff26657fc4533ed20845d921e8aec1df2333fe8eeb1ab6d0763975405
Static task
static1
Behavioral task
behavioral1
Sample
P48274Q89.vbs
Resource
win7-en-20211208
Malware Config
Extracted
njrat
v2.0
HacKed
sxeodus12.duckdns.org:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
P48274Q89.vbs
-
Size
872B
-
MD5
028b34eb17d379cf3688e72225cd95da
-
SHA1
851db5268715999fc8db2d6292096d19e3830d3b
-
SHA256
29bd0ab3b7cb939a7def1c4e4bb78c3c9d7e19d580e6292b155e89b13820309f
-
SHA512
8e1be3d7de63e20e5d8737486b123dff598894bab17f15e69e2ac0f648e4d52b81e261aff26657fc4533ed20845d921e8aec1df2333fe8eeb1ab6d0763975405
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Drops startup file
-
Suspicious use of SetThreadContext
-