General
-
Target
8e9a300c57074786d7c5cb0d00a9a2399b62b7671d75213dc0aa1b7cf05d5cee
-
Size
32KB
-
Sample
220524-z4pdqsccbm
-
MD5
6c81eaa8427c9e3c7029115ffd1c95f5
-
SHA1
d7335af50ba4d7a04bc49ec5ea26aafc8a53f912
-
SHA256
8e9a300c57074786d7c5cb0d00a9a2399b62b7671d75213dc0aa1b7cf05d5cee
-
SHA512
9fbcb99754942e1df493140d725148122fd058aac4c90545196b5d70b72ed719850df46b755e3f8bcaee04f536c5e5b5b2629e013fecb3b94c5fd7e6690f63fb
Behavioral task
behavioral1
Sample
8e9a300c57074786d7c5cb0d00a9a2399b62b7671d75213dc0aa1b7cf05d5cee.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8e9a300c57074786d7c5cb0d00a9a2399b62b7671d75213dc0aa1b7cf05d5cee.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
closhop.duckdns.org:1551
e2b69e6bc697
-
reg_key
e2b69e6bc697
-
splitter
@!#&^%$
Targets
-
-
Target
8e9a300c57074786d7c5cb0d00a9a2399b62b7671d75213dc0aa1b7cf05d5cee
-
Size
32KB
-
MD5
6c81eaa8427c9e3c7029115ffd1c95f5
-
SHA1
d7335af50ba4d7a04bc49ec5ea26aafc8a53f912
-
SHA256
8e9a300c57074786d7c5cb0d00a9a2399b62b7671d75213dc0aa1b7cf05d5cee
-
SHA512
9fbcb99754942e1df493140d725148122fd058aac4c90545196b5d70b72ed719850df46b755e3f8bcaee04f536c5e5b5b2629e013fecb3b94c5fd7e6690f63fb
Score10/10-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-