General

  • Target

    84bf16e9fc3e8e8ca252e0d61340bdbf947d94e8aa4863452a75226331726e13_JC.exe

  • Size

    32KB

  • MD5

    28061df486bd92beba543f51ecfa2c5b

  • SHA1

    4f5c3289cdb0cefb2145517087bb8c62696ffc7d

  • SHA256

    84bf16e9fc3e8e8ca252e0d61340bdbf947d94e8aa4863452a75226331726e13

  • SHA512

    b73d8daa45f9ae9935a8977b67cd7a565df51097b0fcf6edb622985fe3cdda8e922590f203022b8771d1cd535f05ee7a387f01402df38b54db9e98644af0bfb4

  • SSDEEP

    384:Y0bUe5XB4e0XGODOlXCpF7r/6WTetTUFQqzFhObbI:tT9BuVqlQ2HbI

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

fortuna777.duckdns.org:1994

Mutex

40824090a87

Attributes
  • reg_key

    40824090a87

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 84bf16e9fc3e8e8ca252e0d61340bdbf947d94e8aa4863452a75226331726e13_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections