General
-
Target
sostener.vbs
-
Size
1.6MB
-
Sample
240924-e5ekpstbmk
-
MD5
8476643328f5fd81e1144a3f9b340a7f
-
SHA1
2b07f0425c5ac7a7b8ac33f903780d740769e92f
-
SHA256
3f15c83a041604541d777c6837797d4b28196f3a6926375324a2dbfb993823c0
-
SHA512
abd50137cea3607d8535eef8cda4f20e0cfa77c533468b48c7af443bbcc13a0f60e5813c08919eeb2786f4634e7bbec8013f0fb8057424e9e4659abafd2a046b
-
SSDEEP
192:9PmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPPI:V2GsBchF2lK
Static task
static1
Behavioral task
behavioral1
Sample
sostener.vbs
Resource
win7-20240708-en
Malware Config
Extracted
http://pastebin.com/raw/V9y5Q5vv
Extracted
njrat
0.7NC
NYAN CAT
michael2009nj.duckdns.org:2828
bf4e531b630e4de6ab2
-
reg_key
bf4e531b630e4de6ab2
-
splitter
@!#&^%$
Targets
-
-
Target
sostener.vbs
-
Size
1.6MB
-
MD5
8476643328f5fd81e1144a3f9b340a7f
-
SHA1
2b07f0425c5ac7a7b8ac33f903780d740769e92f
-
SHA256
3f15c83a041604541d777c6837797d4b28196f3a6926375324a2dbfb993823c0
-
SHA512
abd50137cea3607d8535eef8cda4f20e0cfa77c533468b48c7af443bbcc13a0f60e5813c08919eeb2786f4634e7bbec8013f0fb8057424e9e4659abafd2a046b
-
SSDEEP
192:9PmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPPmPPPPPPGPmPPPPI:V2GsBchF2lK
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-