General

  • Target

    bPfF.exe

  • Size

    32KB

  • MD5

    83279f46256b42db62008a4756667387

  • SHA1

    b71d7c3edb5f0a321f1b3df6450ab89af5fcb3c8

  • SHA256

    219abee8c04343f51a30c8a1fe1c5dac6e948118e04d662f22dd0c4b3a787f0a

  • SHA512

    0bb1a316aed76e3ac82430fc9a833990ad8a52a854a50a1f5624e2b9e7305b3fc36b148da3b3a5bc958ced348b0280a520806c30e5be661168913dfd47c7f1ef

  • SSDEEP

    384:60bUe5XB4e0XLOfOliaXLilpknD4WTMtTUFQqz9GObba:jT9BuypaXWlpwba

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

dubay.duckdns.org:1994

Mutex

e6531e109e344a

Attributes
  • reg_key

    e6531e109e344a

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bPfF.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections