General

  • Target

    bPuC.exe

  • Size

    32KB

  • MD5

    ca200c4dfa94e84a23cd210cdc907fc0

  • SHA1

    58cc98e227b5aa117b49fb60f8a5b31a7eb897ad

  • SHA256

    e07b114dc126e3c9b27cabb8077931d1c3805457eee0d83db6b9717f185874c8

  • SHA512

    96f2fa3cb8d3d7715d8f946abcf5cc5d5f643c71c24893ab5f3a5852bed526854376ce36862b6b72105d8a4c33f7d1e6dc88dcf8d5e5ac740cb4ebb023cba390

  • SSDEEP

    384:d0bUe5XB4e0XXOhbw0Q0mS03AWTxtTUFQqzFOObb9:OT9BueC55d0b9

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

paris46.duckdns.org:1982

Mutex

d1babdce3409473496b

Attributes
  • reg_key

    d1babdce3409473496b

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bPuC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections