General
-
Target
bc1df94edc704d4be73eb5e91c2331be.vbs
-
Size
151KB
-
Sample
211221-sdctpaefbq
-
MD5
bc1df94edc704d4be73eb5e91c2331be
-
SHA1
18d6f490b6a99d8a17df13c0bd037fd56e215d8c
-
SHA256
946bd0343beb66996e777f0f7b83143053aa574ddaae249fae927795891a0363
-
SHA512
1c6af4ec257a33e365dc43b278fbbbd4e127cfe1b89974c871425b8165b30c374707eac15deaeb7b4bb869159d9d4271951dc7ce28cf062f9c147278018b1d61
Static task
static1
Behavioral task
behavioral1
Sample
bc1df94edc704d4be73eb5e91c2331be.vbs
Resource
win7-en-20211208
Malware Config
Extracted
http://91.241.19.49/ramdes/DownloaderF3.txt
Extracted
njrat
0.7NC
NYAN CAT
revg.duckdns.org:57831
ebef4abe57d24e8
-
reg_key
ebef4abe57d24e8
-
splitter
@!#&^%$
Targets
-
-
Target
bc1df94edc704d4be73eb5e91c2331be.vbs
-
Size
151KB
-
MD5
bc1df94edc704d4be73eb5e91c2331be
-
SHA1
18d6f490b6a99d8a17df13c0bd037fd56e215d8c
-
SHA256
946bd0343beb66996e777f0f7b83143053aa574ddaae249fae927795891a0363
-
SHA512
1c6af4ec257a33e365dc43b278fbbbd4e127cfe1b89974c871425b8165b30c374707eac15deaeb7b4bb869159d9d4271951dc7ce28cf062f9c147278018b1d61
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Blocklisted process makes network request
-
Drops startup file
-
Suspicious use of SetThreadContext
-