General
-
Target
sostener.vbs
-
Size
15.4MB
-
Sample
241003-hqcpcazglk
-
MD5
3ac2f2a9e0ea75fabc9cd17a6cfad0c5
-
SHA1
918caec409f9a49bc055bbfb02d458c131724c83
-
SHA256
48bb80b78ab20e88487589c0d691bd65a8d40f785d2d18d54c06bbedd09ca559
-
SHA512
be4ce3a8489eb2ac441a9ea7c61f93f1b64a4e8435f8bcfbad0c0d83fcc1b7d6e6b5c3b0309616b7ed2bcbd173ce5427e257e14dc84e491766ffbc51af3a1327
-
SSDEEP
192:9HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHM:qXmHsr0+uF8
Static task
static1
Behavioral task
behavioral1
Sample
sostener.vbs
Resource
win7-20240903-en
Malware Config
Extracted
http://pastebin.com/raw/V9y5Q5vv
Extracted
njrat
0.7NC
NYAN CAT
sundsvall00020.duckdns.org:3737
30e36121f3f1488e82
-
reg_key
30e36121f3f1488e82
-
splitter
@!#&^%$
Targets
-
-
Target
sostener.vbs
-
Size
15.4MB
-
MD5
3ac2f2a9e0ea75fabc9cd17a6cfad0c5
-
SHA1
918caec409f9a49bc055bbfb02d458c131724c83
-
SHA256
48bb80b78ab20e88487589c0d691bd65a8d40f785d2d18d54c06bbedd09ca559
-
SHA512
be4ce3a8489eb2ac441a9ea7c61f93f1b64a4e8435f8bcfbad0c0d83fcc1b7d6e6b5c3b0309616b7ed2bcbd173ce5427e257e14dc84e491766ffbc51af3a1327
-
SSDEEP
192:9HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHM:qXmHsr0+uF8
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-