General
-
Target
48bb80b78ab20e88487589c0d691bd65a8d40f785d2d18d54c06bbedd09ca559.vbs
-
Size
15.4MB
-
Sample
241004-bs432s1bkb
-
MD5
3ac2f2a9e0ea75fabc9cd17a6cfad0c5
-
SHA1
918caec409f9a49bc055bbfb02d458c131724c83
-
SHA256
48bb80b78ab20e88487589c0d691bd65a8d40f785d2d18d54c06bbedd09ca559
-
SHA512
be4ce3a8489eb2ac441a9ea7c61f93f1b64a4e8435f8bcfbad0c0d83fcc1b7d6e6b5c3b0309616b7ed2bcbd173ce5427e257e14dc84e491766ffbc51af3a1327
-
SSDEEP
192:9HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHM:qXmHsr0+uF8
Static task
static1
Behavioral task
behavioral1
Sample
48bb80b78ab20e88487589c0d691bd65a8d40f785d2d18d54c06bbedd09ca559.vbs
Resource
win7-20240708-en
Malware Config
Extracted
http://pastebin.com/raw/V9y5Q5vv
Extracted
njrat
0.7NC
NYAN CAT
michael2009nj.duckdns.org:2828
bf4e531b630e4de6ab2
-
reg_key
bf4e531b630e4de6ab2
-
splitter
@!#&^%$
Targets
-
-
Target
48bb80b78ab20e88487589c0d691bd65a8d40f785d2d18d54c06bbedd09ca559.vbs
-
Size
15.4MB
-
MD5
3ac2f2a9e0ea75fabc9cd17a6cfad0c5
-
SHA1
918caec409f9a49bc055bbfb02d458c131724c83
-
SHA256
48bb80b78ab20e88487589c0d691bd65a8d40f785d2d18d54c06bbedd09ca559
-
SHA512
be4ce3a8489eb2ac441a9ea7c61f93f1b64a4e8435f8bcfbad0c0d83fcc1b7d6e6b5c3b0309616b7ed2bcbd173ce5427e257e14dc84e491766ffbc51af3a1327
-
SSDEEP
192:9HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHM:qXmHsr0+uF8
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-