General
-
Target
Comprovante de pagamento.ppam
-
Size
21KB
-
Sample
211224-q6zg2secf7
-
MD5
2f7315fa6a61313b7a1da2ee13771b7b
-
SHA1
890531e02b962918c7f90932813f4ba806f8096f
-
SHA256
e66f6e30846e7935869eb4f6107a072f2503a0a84dcae60686e436e2b60b4237
-
SHA512
bef51100bf82650c502988270e560b2a6cb49d0a6574390c59b65d7ce71f7fcb9ad4734416003e71a94102fb5b293faddfb0689ed4dd1f68ed938dde53707ac6
Static task
static1
Behavioral task
behavioral1
Sample
Comprovante de pagamento.ppam
Resource
win7-en-20211208
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
fidapeste2.duckdns.org:5552
1e218580272
-
reg_key
1e218580272
-
splitter
@!#&^%$
Targets
-
-
Target
Comprovante de pagamento.ppam
-
Size
21KB
-
MD5
2f7315fa6a61313b7a1da2ee13771b7b
-
SHA1
890531e02b962918c7f90932813f4ba806f8096f
-
SHA256
e66f6e30846e7935869eb4f6107a072f2503a0a84dcae60686e436e2b60b4237
-
SHA512
bef51100bf82650c502988270e560b2a6cb49d0a6574390c59b65d7ce71f7fcb9ad4734416003e71a94102fb5b293faddfb0689ed4dd1f68ed938dde53707ac6
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops startup file
-
Suspicious use of SetThreadContext
-