General

  • Target

    ea0bca71a5a4b7e0e4dad6ccc64ffc2dc940e83d7ae54449e9bf6f3ed1ccc568_JC.exe

  • Size

    32KB

  • Sample

    230830-w6bzmsha4s

  • MD5

    14c4e906889f3571e4948a5d5ae96a33

  • SHA1

    5698dd999cafc1aa6ab7ef5bf519ef29a2cd5660

  • SHA256

    ea0bca71a5a4b7e0e4dad6ccc64ffc2dc940e83d7ae54449e9bf6f3ed1ccc568

  • SHA512

    bbb5ad45e8df7f4bdb4c545e4955bc925ff615acf48a076ac1b2240077d65b1f6bbeab076064b14285fc3d200e49b28c19e5c1b50e4140f1517cf708bab2b8df

  • SSDEEP

    384:80bUe5XB4e0XHOnNc4DuzpP161WTotTUFQqz9vObby:pT9BuuSsQCPNby

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

tesxnext.duckdns.org:9993

Mutex

9a2f49f03d144a2

Attributes
  • reg_key

    9a2f49f03d144a2

  • splitter

    @!#&^%$

Targets

    • Target

      ea0bca71a5a4b7e0e4dad6ccc64ffc2dc940e83d7ae54449e9bf6f3ed1ccc568_JC.exe

    • Size

      32KB

    • MD5

      14c4e906889f3571e4948a5d5ae96a33

    • SHA1

      5698dd999cafc1aa6ab7ef5bf519ef29a2cd5660

    • SHA256

      ea0bca71a5a4b7e0e4dad6ccc64ffc2dc940e83d7ae54449e9bf6f3ed1ccc568

    • SHA512

      bbb5ad45e8df7f4bdb4c545e4955bc925ff615acf48a076ac1b2240077d65b1f6bbeab076064b14285fc3d200e49b28c19e5c1b50e4140f1517cf708bab2b8df

    • SSDEEP

      384:80bUe5XB4e0XHOnNc4DuzpP161WTotTUFQqz9vObby:pT9BuuSsQCPNby

    Score
    1/10

MITRE ATT&CK Matrix

Tasks