General

  • Target

    ce04da3615437d8fe45cc3b2038f6a567c885fcd68c84cd1c7aefd595df2ba07_JC.exe

  • Size

    32KB

  • MD5

    864b883c949abe75582f7a04ef60fdf7

  • SHA1

    a268887e4b70595dddc2652dd61732715e950725

  • SHA256

    ce04da3615437d8fe45cc3b2038f6a567c885fcd68c84cd1c7aefd595df2ba07

  • SHA512

    b7f045fa5502f3b5bef874b05b4aab3e55019311d4ebf63207287393297ea492301190dc6d4394c56c3fa8a9d24431c1774bbf6735db6b9e0543b1622826bb07

  • SSDEEP

    384:J0bUe5XB4e0XWODHixBr/QBWTytTUFQqzFAObbO:yT9BuFzifrYXibO

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

tiagoodiaz.duckdns.org :1994

Mutex

bc41251536

Attributes
  • reg_key

    bc41251536

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ce04da3615437d8fe45cc3b2038f6a567c885fcd68c84cd1c7aefd595df2ba07_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections