General

  • Target

    d46f1f55a640e3ef3b694602a70e59ed.bin

  • Size

    10KB

  • MD5

    f0f6c351b7046cafeac4fe5544073e0e

  • SHA1

    e87bf18b0491cafd795fd2d953e2e8168f31e2f9

  • SHA256

    67ac46138c7a8c05499a1df129e0a5c783ce63c1adb13af70a7b7729e75e6d14

  • SHA512

    2ca52f799ece337fffd098e1aa6422b43c6f62195276dd7a66f13b2e449a2fa737a569359f457e04104466ed829f7339a817ffdd5831a9d719733aa42b51ba89

  • SSDEEP

    192:E3N317rFmTsJPHHhHLvM19pZScnSVT7XcDhBGYnvAR9KwQ+3tkoWO/u:A31RDZHQTnKfXcDhBG/9KoXT/u

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

fortuna777.duckdns.org:1994

Mutex

034a57ce3a384

Attributes
  • reg_key

    034a57ce3a384

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d46f1f55a640e3ef3b694602a70e59ed.bin
    .zip

    Password: infected

  • d6ad84287643e005e6a53037fbddd106b224524ad2b6157eee6445942cb6a954.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections