General
-
Target
Payload.exe
-
Size
55KB
-
Sample
241202-vbbjysylen
-
MD5
6607fcf7763d63e262dc84410bbeb729
-
SHA1
258cd5c203d90cca1362b417c0a6fdfed2a83ca7
-
SHA256
2059f6871d29e0ea9bec89a4af8a117551ea3a3cd844691557bd8804e3af5e2a
-
SHA512
b2dac9364f0cb5183e4259b95d95ffb79fea908606d968f0baeb6be5996c00bccbead2608621edd5601038ce469faa6a2148d603d7f28f68ae7105a5bbe06a43
-
SSDEEP
1536:EmsoDnb4DNQ7SCCHDrwsNMD+XExI3pmAm:YoDnEWOrHDrwsNMD+XExI3pm
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
cnet-contracting.gl.at.ply.gg:10206
578c40e26a890cb6801040b7382c8b97
-
reg_key
578c40e26a890cb6801040b7382c8b97
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
Payload.exe
-
Size
55KB
-
MD5
6607fcf7763d63e262dc84410bbeb729
-
SHA1
258cd5c203d90cca1362b417c0a6fdfed2a83ca7
-
SHA256
2059f6871d29e0ea9bec89a4af8a117551ea3a3cd844691557bd8804e3af5e2a
-
SHA512
b2dac9364f0cb5183e4259b95d95ffb79fea908606d968f0baeb6be5996c00bccbead2608621edd5601038ce469faa6a2148d603d7f28f68ae7105a5bbe06a43
-
SSDEEP
1536:EmsoDnb4DNQ7SCCHDrwsNMD+XExI3pmAm:YoDnEWOrHDrwsNMD+XExI3pm
-
Njrat family
-