=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

jc1NVSdAkP.exe

Status: finished
Submission Time: 2022-05-14 15:37:07 +02:00
Malicious
Trojan
Evader
Njrat

Comments

Tags

  • exe
  • njrat
  • RAT

Details

  • Analysis ID:
    626606
  • API (Web) ID:
    994110
  • Analysis Started:
    2022-05-14 15:37:08 +02:00
  • Analysis Finished:
    2022-05-14 15:45:51 +02:00
  • MD5:
    4ae230eae2ec7bb0cfe6f9069616421e
  • SHA1:
    2439307f4a8b2d0938ab5bf480a0b12da403933b
  • SHA256:
    5f22cd86922fc0dfff33f6d9906291e50d12259b86e5a8bc804b6945ca7e994e
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
44/69

malicious
10/38

malicious
25/41

malicious

malicious

IPs

IP Country Detection
41.103.180.209
Algeria

Domains

Name IP Detection
volkatv500.sytes.net
41.103.180.209

URLs

Name Detection
volkatv500.sytes.net
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
Click to see the 27 hidden entries
http://www.fontbureau.com/designersG
http://www.fontbureau.com/designers/?
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers?
http://www.tiro.com
http://www.fontbureau.com/designers
http://www.goodfont.co.kr
http://en.w
http://www.carterandcone.coml
http://www.sajatypeworks.com
http://www.typography.netD
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.founder.com.cn/cn/cThe
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/frere-jones.html
http://www.fontbureau.com/designers/cabarga.html
http://www.jiyu-kobo.co.jp/
http://www.galapagosdesign.com/DPlease
http://www.fontbureau.com/designers8
http://www.ascendercorp.com/typedesigners.html
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://www.sakkal.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\jc1NVSdAkP.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\sytesnet.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Windows\assembly\Desktop.ini
Windows desktop.ini, ASCII text, with CRLF line terminators
#
Click to see the 1 hidden entries
\Device\ConDrv
ASCII text, with CRLF line terminators
#