General

  • Target

    8e9a300c57074786d7c5cb0d00a9a2399b62b7671d75213dc0aa1b7cf05d5cee

  • Size

    32KB

  • Sample

    220524-z4pdqsccbm

  • MD5

    6c81eaa8427c9e3c7029115ffd1c95f5

  • SHA1

    d7335af50ba4d7a04bc49ec5ea26aafc8a53f912

  • SHA256

    8e9a300c57074786d7c5cb0d00a9a2399b62b7671d75213dc0aa1b7cf05d5cee

  • SHA512

    9fbcb99754942e1df493140d725148122fd058aac4c90545196b5d70b72ed719850df46b755e3f8bcaee04f536c5e5b5b2629e013fecb3b94c5fd7e6690f63fb

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

closhop.duckdns.org:1551

Mutex

e2b69e6bc697

Attributes
  • reg_key

    e2b69e6bc697

  • splitter

    @!#&^%$

Targets

    • Target

      8e9a300c57074786d7c5cb0d00a9a2399b62b7671d75213dc0aa1b7cf05d5cee

    • Size

      32KB

    • MD5

      6c81eaa8427c9e3c7029115ffd1c95f5

    • SHA1

      d7335af50ba4d7a04bc49ec5ea26aafc8a53f912

    • SHA256

      8e9a300c57074786d7c5cb0d00a9a2399b62b7671d75213dc0aa1b7cf05d5cee

    • SHA512

      9fbcb99754942e1df493140d725148122fd058aac4c90545196b5d70b72ed719850df46b755e3f8bcaee04f536c5e5b5b2629e013fecb3b94c5fd7e6690f63fb

    Score
    10/10
    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

MITRE ATT&CK Matrix

Tasks