General

  • Target

    93c9932bb4d7694d7faf034c774f69ec.bin

  • Size

    10KB

  • MD5

    b4450e4054e081789cf0053d86dfc412

  • SHA1

    dec87f6a3cba4d1af02a6f1a1953c2da85ffd97c

  • SHA256

    a4f52a1987c89d8a2d0c4b621089039bac331d1e351c96d2e1d2191ffa98a315

  • SHA512

    cd0519ae8d00a70325a5572c1510071a46612c0be0d7c51af5868eadae48ed85d3a2172702968291a40b195d10d38a0ce6c8cf766908aa680a356946285cc7f8

  • SSDEEP

    192:qtkbeRUxyUnLdccK9Qe2iOOg57xhxHjXJP1mb/aSZToMASXdc6Z:bfLDK37OOg59hxH7vmjatM7Xq8

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

tiagoodiaz.duckdns.org:1994

Mutex

37d4a7661fdc462993

Attributes
  • reg_key

    37d4a7661fdc462993

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 93c9932bb4d7694d7faf034c774f69ec.bin
    .zip

    Password: infected

  • 4af08d67c5c9aa9287b61632223f0dfb2784e37469aa2aac2f47b62a59508bc6.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections