General

  • Target

    xbd0vU3xnyOS.exe

  • Size

    32KB

  • MD5

    42213d434da48e000c97fc63ff95b95f

  • SHA1

    aae5b55781424dfa669a0cd109c257195ab8e059

  • SHA256

    3b3c9d324b584b4ec95400221b50e127176071e4a081c487b3b8290feac22d58

  • SHA512

    2ea673f5057cee812da2905d4a355407a86e712e1f24c6b1dda159d3b4cccae5ec86997399292e3bb742c5b6a375b106b59a21b00ae66c2644eecf9b587b092b

  • SSDEEP

    384:A0bUe5XB4e0XjODzw0Q0mS03AWTxtTUFQqzF4ObbV:lT9Bu6Y55dKbV

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

rusia.duckdns.org:2020

Mutex

48ce43ad6d094785

Attributes
  • reg_key

    48ce43ad6d094785

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • xbd0vU3xnyOS.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections