General
-
Target
segura.vbs
-
Size
483KB
-
Sample
241003-3m9j5awgmf
-
MD5
52917612f2ba8deed79d211c0bd5746f
-
SHA1
dea790f7518809133c06fee3931e742600613a9b
-
SHA256
76909f885c6b7247c7176b2cc08830c78b8b831bf7d3f0d9eec38da53e8ae93b
-
SHA512
d7260e28e3749fb5e5933ce1b451c4284da72a155feefacffd679ec7c68fc5906655443bbf40cacb2af7c682107e3c846300a90a05f1bb3e45c3b72026d0c9dd
-
SSDEEP
12288:3FIsz/Eb1lVfwxg6kUTGuimfRkZGOm76nrONHcIZgBVU4UupEFgAA0bOpZc+wGc8:3Dmjp7BFr
Static task
static1
Malware Config
Extracted
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
Extracted
njrat
0.7NC
NYAN CAT
02oct.duckdns.org:9001
68583eab59
-
reg_key
68583eab59
-
splitter
@!#&^%$
Targets
-
-
Target
segura.vbs
-
Size
483KB
-
MD5
52917612f2ba8deed79d211c0bd5746f
-
SHA1
dea790f7518809133c06fee3931e742600613a9b
-
SHA256
76909f885c6b7247c7176b2cc08830c78b8b831bf7d3f0d9eec38da53e8ae93b
-
SHA512
d7260e28e3749fb5e5933ce1b451c4284da72a155feefacffd679ec7c68fc5906655443bbf40cacb2af7c682107e3c846300a90a05f1bb3e45c3b72026d0c9dd
-
SSDEEP
12288:3FIsz/Eb1lVfwxg6kUTGuimfRkZGOm76nrONHcIZgBVU4UupEFgAA0bOpZc+wGc8:3Dmjp7BFr
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-