Behavioral task
behavioral1
Sample
xRDKEIoDBglQ.exe
Resource
win7-20230621-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
xRDKEIoDBglQ.exe
Resource
win10v2004-20230621-en
1 signatures
150 seconds
General
-
Target
xRDKEIoDBglQ.exe
-
Size
32KB
-
MD5
5bced86a3e4a66a0a9091a2835271f93
-
SHA1
59860e44dcc31203e7f7a71a8e375d5d7fcd3298
-
SHA256
2b558fb3080acf42d6e5a14aefcea6ea83aace62bbcc2d4eee33191480557801
-
SHA512
8df39d3e9ff35339d55f9cdc6606388ff79094c8e17c2c6270f0613f086b3dacc3b201ddb4b7e8d799a2f64487994a32f880701e37b9dd28e98bcac3809573ee
-
SSDEEP
384:o0bUe5XB4e0XUpOjfrw0Q0mS03AWTxtTUFQqzFsObb9:dT9Bulj855dSb9
Malware Config
Extracted
Family
njrat
Version
0.7NC
Botnet
NYAN CAT
C2
nzul13-3-23.duckdns.org:5000
Mutex
1b3d37f4dc7f4f
Attributes
-
reg_key
1b3d37f4dc7f4f
-
splitter
@!#&^%$
Signatures
-
Njrat family
Files
-
xRDKEIoDBglQ.exe