General
-
Target
0f35bfed5b1817310378a5df58ca5fcd
-
Size
84KB
-
Sample
221010-y6fc6sdcdk
-
MD5
0f35bfed5b1817310378a5df58ca5fcd
-
SHA1
3062b699b4944f3e70ee80127fe760a68fb3f453
-
SHA256
bc07c50c0b92825bf9436f7a6816bd86c54f827c00c87304b63ff67ee05e695d
-
SHA512
c14007ae998ac0bfa7816f314e0c42919c820651e327eb67f6c182e2bd2b0aa2fdef64d6b7f7f51471e6f4903a4e632d354bed5a49ad5f411801857abfc3e9c0
-
SSDEEP
48:4sLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLG:tiJZ
Static task
static1
Behavioral task
behavioral1
Sample
0f35bfed5b1817310378a5df58ca5fcd.wsf
Resource
win7-20220812-en
Malware Config
Extracted
https://tinyurl.com/2erph6cs
Extracted
njrat
0.7NC
NYAN CAT
dnsproxi2022.duckdns.org:1986
6beb218c1e6044f785a
-
reg_key
6beb218c1e6044f785a
-
splitter
@!#&^%$
Targets
-
-
Target
0f35bfed5b1817310378a5df58ca5fcd
-
Size
84KB
-
MD5
0f35bfed5b1817310378a5df58ca5fcd
-
SHA1
3062b699b4944f3e70ee80127fe760a68fb3f453
-
SHA256
bc07c50c0b92825bf9436f7a6816bd86c54f827c00c87304b63ff67ee05e695d
-
SHA512
c14007ae998ac0bfa7816f314e0c42919c820651e327eb67f6c182e2bd2b0aa2fdef64d6b7f7f51471e6f4903a4e632d354bed5a49ad5f411801857abfc3e9c0
-
SSDEEP
48:4sLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLsLG:tiJZ
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-