General

  • Target

    ea0bca71a5a4b7e0e4dad6ccc64ffc2dc940e83d7ae54449e9bf6f3ed1ccc568_JC.exe

  • Size

    32KB

  • MD5

    14c4e906889f3571e4948a5d5ae96a33

  • SHA1

    5698dd999cafc1aa6ab7ef5bf519ef29a2cd5660

  • SHA256

    ea0bca71a5a4b7e0e4dad6ccc64ffc2dc940e83d7ae54449e9bf6f3ed1ccc568

  • SHA512

    bbb5ad45e8df7f4bdb4c545e4955bc925ff615acf48a076ac1b2240077d65b1f6bbeab076064b14285fc3d200e49b28c19e5c1b50e4140f1517cf708bab2b8df

  • SSDEEP

    384:80bUe5XB4e0XHOnNc4DuzpP161WTotTUFQqz9vObby:pT9BuuSsQCPNby

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

tesxnext.duckdns.org:9993

Mutex

9a2f49f03d144a2

Attributes
  • reg_key

    9a2f49f03d144a2

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ea0bca71a5a4b7e0e4dad6ccc64ffc2dc940e83d7ae54449e9bf6f3ed1ccc568_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections