General

  • Target

    410e999c7495976a0e968dcd03bba00202fd0bd5bfe60f679c0a8836ae5924ec_JC.exe

  • Size

    32KB

  • MD5

    a121c08b062c6ad1fe720bccaa16d3f9

  • SHA1

    3156f47845914bc3ddc09e0a5c7d675e7c555d02

  • SHA256

    410e999c7495976a0e968dcd03bba00202fd0bd5bfe60f679c0a8836ae5924ec

  • SHA512

    124f6774a2b0ffd8643f2a95d1732b03d38e1cac484b03070896b141882563c8667601e6b64f989d6f2ebe5076da564f44942954ae743a8c51d0cd5d2c20ac73

  • SSDEEP

    384:r0bUe5XB4e0XLOfOliaXLilpknDPWTntTUFQqz9xObbt:IT9BuypaXWlx7bt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

berlynm98.duckdns.org:7771

Mutex

16e6be3266

Attributes
  • reg_key

    16e6be3266

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 410e999c7495976a0e968dcd03bba00202fd0bd5bfe60f679c0a8836ae5924ec_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections