Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 22:02

General

  • Target

    bypass-cmstp-njrat--master/cmstp bypass v 1.0 3xploit.exe

  • Size

    270KB

  • MD5

    ab21272c6aa4c2583bdeb32369310a8b

  • SHA1

    6cbe50491cfffbedb25cc6e5110098e294b92a9e

  • SHA256

    8d03a1585148967912a542af444269419346fca30f3dbdd70f1ab6a63a03a52a

  • SHA512

    f03986148e8d1328fee568162682ace273ca6d0bc2c8ebe136f55efa8749c190799d6077694909293854d1e38c372db0b62e2a9600abcbb99cc2fe1f8e50cc6e

  • SSDEEP

    6144:wsjqt5TMJhA7OpC4DD9nLRY18HnsVJdZC9watLscx47P:wsjqt5TMBpC4/9nLRS8MzcDu7

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\bypass-cmstp-njrat--master\cmstp bypass v 1.0 3xploit.exe
    "C:\Users\Admin\AppData\Local\Temp\bypass-cmstp-njrat--master\cmstp bypass v 1.0 3xploit.exe"
    1⤵
      PID:1952

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1952-0-0x000007FEF5C93000-0x000007FEF5C94000-memory.dmp

            Filesize

            4KB

          • memory/1952-1-0x0000000000E70000-0x0000000000EBA000-memory.dmp

            Filesize

            296KB