General
-
Target
faas.ps1
-
Size
125KB
-
Sample
250109-2mj4ssvrfl
-
MD5
d8c72c294f72a8b7541b91ed18cbe16c
-
SHA1
86e589115fcb800714350458674f06032a8c0ed7
-
SHA256
68c902097fafe0f8b5909e267d1fe6912e943b07f7e9a96030de32da676635eb
-
SHA512
0795004a0814dcfca238005dafc1e240b2ceca0b13909176f0721fbed8a54b0e2a527f33b2d3e94917a1b68f1302d35a092c00b5dc726dbf6a9fbc4d9732c1df
-
SSDEEP
3072:W1FulgDUujHZ9WOASQ87jX9a7nvDNCvJZSHDmhKvrQxa0:mF1UKrWOAsj0vDNCvvWsKzQx3
Static task
static1
Behavioral task
behavioral1
Sample
faas.ps1
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
faas.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
127.0.0.1:4444
51820cb0a31bd77e1a3fe5a2fd3b47f2
-
reg_key
51820cb0a31bd77e1a3fe5a2fd3b47f2
-
splitter
|'|'|
Targets
-
-
Target
faas.ps1
-
Size
125KB
-
MD5
d8c72c294f72a8b7541b91ed18cbe16c
-
SHA1
86e589115fcb800714350458674f06032a8c0ed7
-
SHA256
68c902097fafe0f8b5909e267d1fe6912e943b07f7e9a96030de32da676635eb
-
SHA512
0795004a0814dcfca238005dafc1e240b2ceca0b13909176f0721fbed8a54b0e2a527f33b2d3e94917a1b68f1302d35a092c00b5dc726dbf6a9fbc4d9732c1df
-
SSDEEP
3072:W1FulgDUujHZ9WOASQ87jX9a7nvDNCvJZSHDmhKvrQxa0:mF1UKrWOAsj0vDNCvvWsKzQx3
-
Njrat family
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Drops file in System32 directory
-