General
-
Target
03e4a5b246180743a15aabbe28f2acb5
-
Size
1KB
-
Sample
231229-zt1n1sdab9
-
MD5
03e4a5b246180743a15aabbe28f2acb5
-
SHA1
36caf7a27c4eb6c30557737ea50b8e47e32e07a9
-
SHA256
03674af9c28f5702955756f95a9173954188deb1d4f14b0bc8f0457e9383d6db
-
SHA512
3cd8706b9105cd1a71d95142eb62df9f39601a7752648ce47583d1b8715f89c0d839e161730ef1d77becb7b9f0edae6ff353394046fa7e9901f9e06bbf291996
Static task
static1
Behavioral task
behavioral1
Sample
03e4a5b246180743a15aabbe28f2acb5.vbs
Resource
win7-20231215-en
Malware Config
Extracted
https://ia601506.us.archive.org/27/items/bypass_202108/bypass.txt
Extracted
njrat
v4.0
HacKed
13.77.222.211:7827
Windows
-
reg_key
Windows
-
splitter
|-F-|
Extracted
bitrat
1.38
20.194.35.6:7904
-
communication_password
202cb962ac59075b964b07152d234b70
-
install_dir
Appdata
-
install_file
Google.exe
-
tor_process
tor
Targets
-
-
Target
03e4a5b246180743a15aabbe28f2acb5
-
Size
1KB
-
MD5
03e4a5b246180743a15aabbe28f2acb5
-
SHA1
36caf7a27c4eb6c30557737ea50b8e47e32e07a9
-
SHA256
03674af9c28f5702955756f95a9173954188deb1d4f14b0bc8f0457e9383d6db
-
SHA512
3cd8706b9105cd1a71d95142eb62df9f39601a7752648ce47583d1b8715f89c0d839e161730ef1d77becb7b9f0edae6ff353394046fa7e9901f9e06bbf291996
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-