General
-
Target
ComprovanteXdeXreserva.ppam
-
Size
20KB
-
Sample
220110-e8th2adha8
-
MD5
fd0d3e25d88b5c318f4dc543a7770f22
-
SHA1
94572d313222700a565f2ff161223bb28464636c
-
SHA256
623027463a2ef70f60ff6a0991019847a3fb24da3b633b52da4a99a77c99f92b
-
SHA512
48936b4677c10a8466cbaa631a9cbc8ce2b0d995b427fd56c894d98d42abc834bbaeb397401ff131b94f93f05978c8496cf9beaad2f059d8bd04511b40e2e9d8
Static task
static1
Behavioral task
behavioral1
Sample
ComprovanteXdeXreserva.ppam
Resource
win7-en-20211208
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
fidapeste2.duckdns.org:5552
94b3fabc19494c
-
reg_key
94b3fabc19494c
-
splitter
@!#&^%$
Targets
-
-
Target
ComprovanteXdeXreserva.ppam
-
Size
20KB
-
MD5
fd0d3e25d88b5c318f4dc543a7770f22
-
SHA1
94572d313222700a565f2ff161223bb28464636c
-
SHA256
623027463a2ef70f60ff6a0991019847a3fb24da3b633b52da4a99a77c99f92b
-
SHA512
48936b4677c10a8466cbaa631a9cbc8ce2b0d995b427fd56c894d98d42abc834bbaeb397401ff131b94f93f05978c8496cf9beaad2f059d8bd04511b40e2e9d8
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops startup file
-
Suspicious use of SetThreadContext
-