General

  • Target

    3441a429a71ac1ad6e910efdd06cacd3.exe

  • Size

    315KB

  • Sample

    210927-w4bwvshggn

  • MD5

    3441a429a71ac1ad6e910efdd06cacd3

  • SHA1

    d4f2ab9a718b2da7c4b1d1863dbc6a83b3e29264

  • SHA256

    d3763d5c2317a279fc6ffce59700fb96f10570178d81c01a912db7b17811798c

  • SHA512

    e9564dd693fc9391aa6d121c714e807820f2dce50c4809a11914274adfeec1ce721caf72b4801916fa35a9abcb078e3242ac2e28b54aa558ca0f54bf8dee5b8a

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

strigoo.duckdns.org:9889

Mutex

aed1603e66c64f9fafe

Attributes
  • reg_key

    aed1603e66c64f9fafe

  • splitter

    @!#&^%$

Targets

    • Target

      3441a429a71ac1ad6e910efdd06cacd3.exe

    • Size

      315KB

    • MD5

      3441a429a71ac1ad6e910efdd06cacd3

    • SHA1

      d4f2ab9a718b2da7c4b1d1863dbc6a83b3e29264

    • SHA256

      d3763d5c2317a279fc6ffce59700fb96f10570178d81c01a912db7b17811798c

    • SHA512

      e9564dd693fc9391aa6d121c714e807820f2dce50c4809a11914274adfeec1ce721caf72b4801916fa35a9abcb078e3242ac2e28b54aa558ca0f54bf8dee5b8a

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Core1 .NET packer

      Detects packer/loader used by .NET malware.

MITRE ATT&CK Matrix

Tasks