General

  • Target

    xYdLlCq2lmVs.exe

  • Size

    32KB

  • MD5

    358cb653ee7d885c09936997b44cd716

  • SHA1

    a1297093c2b95a7175befd4845bc808fb679f123

  • SHA256

    a2a7df2819a5abdd7d805706afc93b2043087dd5b3d17a2ec94b3f12cd23622f

  • SHA512

    5c5c512797bcfa09e528de0146b9e028602376d022f75fad1e30b9b3a115c2347780e05fb9f4e01cc3433dcc69b1b9201666dd5ac4e8f3cfa4e57fc08dce2760

  • SSDEEP

    384:Z0bUe5XB4e0X7OxLw0Q0mS03AWTxtTUFQqzFgObbt:iT9BuCC55d+bt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

patria.duckdns.org:2020

Mutex

816a106dcf11

Attributes
  • reg_key

    816a106dcf11

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • xYdLlCq2lmVs.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections