General

  • Target

    n1604.exe

  • Size

    40KB

  • Sample

    220120-k66ngahcf3

  • MD5

    b478ba662eddb3122bf897c157aad70e

  • SHA1

    c37a214b858da8bc493a217181cfba8473e02034

  • SHA256

    41ae40061cab2c4e4f58d40919b4eeb7a7379eb3b9bba794d7566881bf3e2df0

  • SHA512

    d673fc1681224a0d32bfd8ed70cdc72c764d79e608a3c9bac16151c6357aa600ec3324c493eeb9fc29b39259d78ca355f1c73b7f63e6e927a7648755c7608bbe

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

NYAN CAT

Mutex

xxxxxxxxxxxxxxxxxxxxxxxxxxx

Attributes
  • reg_key

    xxxxxxxxxxxxxxxxxxxxxxxxxxx

  • splitter

    |'|'|

Targets

    • Target

      n1604.exe

    • Size

      40KB

    • MD5

      b478ba662eddb3122bf897c157aad70e

    • SHA1

      c37a214b858da8bc493a217181cfba8473e02034

    • SHA256

      41ae40061cab2c4e4f58d40919b4eeb7a7379eb3b9bba794d7566881bf3e2df0

    • SHA512

      d673fc1681224a0d32bfd8ed70cdc72c764d79e608a3c9bac16151c6357aa600ec3324c493eeb9fc29b39259d78ca355f1c73b7f63e6e927a7648755c7608bbe

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

MITRE ATT&CK Matrix

Tasks