General
-
Target
therealcat.jpg
-
Size
14KB
-
Sample
230802-2p1vbsab79
-
MD5
89efb21ca072c42620e2913758af6307
-
SHA1
55d25c7cf3450e04408a4586a92fd811fff6aa72
-
SHA256
a06046a24ca7e4c19c7244ab46232840319850042a5b72a4a3c1dbaf6db1e288
-
SHA512
2a5e87d00184dd171aa085b00f989a699d86c73a58532ebd31d87925355b76d0456895dc8166351610886975c6e820649e50ad9118b5283ce4aa5ba86c5a783a
-
SSDEEP
384:9wDiJ82hnVno5jff+VPwXT1RyjQdQMh+bD8H:C682ht+eVP41RyjQiMiW
Static task
static1
Behavioral task
behavioral1
Sample
therealcat.jpg
Resource
win7-20230712-en
Malware Config
Extracted
njrat
0.7d
MyBot
10.127.0.138:6522
10.127.0.11:6522
b62ee66a811795b55d5ca9c329503dfb
-
reg_key
b62ee66a811795b55d5ca9c329503dfb
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
therealcat.jpg
-
Size
14KB
-
MD5
89efb21ca072c42620e2913758af6307
-
SHA1
55d25c7cf3450e04408a4586a92fd811fff6aa72
-
SHA256
a06046a24ca7e4c19c7244ab46232840319850042a5b72a4a3c1dbaf6db1e288
-
SHA512
2a5e87d00184dd171aa085b00f989a699d86c73a58532ebd31d87925355b76d0456895dc8166351610886975c6e820649e50ad9118b5283ce4aa5ba86c5a783a
-
SSDEEP
384:9wDiJ82hnVno5jff+VPwXT1RyjQdQMh+bD8H:C682ht+eVP41RyjQiMiW
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Executes dropped EXE
-