General

  • Target

    3f9af37fe399e8cb8eb4e61f7541901788ec1f4b63f99a110fa025421010df43_JC.exe

  • Size

    32KB

  • MD5

    e782fef1056c8725e60e298742004176

  • SHA1

    4dadd7a9364d8a33751005c78d816871512f3056

  • SHA256

    3f9af37fe399e8cb8eb4e61f7541901788ec1f4b63f99a110fa025421010df43

  • SHA512

    13aa6a78b9052011467bc0c7322fe2ca6ffc1e090f4dd922179f36a29d767a4b1ecf18579b01d7e0961ac9cae783d82076af15015ab9ccdb5e70f0a0760f7bd3

  • SSDEEP

    384:w0bUe5XB4e0X0gONaiaXLilpknD+WTCtTUFQqz9TObb4:1T9BuizaXWlRpb4

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

patria.duckdns.org:2020

Mutex

8930d85a9f

Attributes
  • reg_key

    8930d85a9f

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3f9af37fe399e8cb8eb4e61f7541901788ec1f4b63f99a110fa025421010df43_JC.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections