General

  • Target

    NEAS.40f07bdfb74e61fe7d7973bcd4167ffefcff2f8ba2ed6f82e9fcb5a295aaf113exe_JC.exe

  • Size

    32KB

  • MD5

    3947a0556c4159f49b9a7f9d23e2b4f5

  • SHA1

    3ee1ee149ba1d4eaa8c638334d2b3233fe5ee2b5

  • SHA256

    40f07bdfb74e61fe7d7973bcd4167ffefcff2f8ba2ed6f82e9fcb5a295aaf113

  • SHA512

    c777ef5d896ac77c96c93e3f3ae0d9db1e990e0ace3bd0ae8c3404315fece1d36ee54c3ccd0dd1530dffab37b976601c828318d08ad4f0f20baadf7a8e5957d4

  • SSDEEP

    384:L0bUe5XB4e0XFOZzw0Q0mS03AWTxtTUFQqzFx4ObbV:oT9BucC55dEbV

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

1.tcp.sa.ngrok.io:21422

Mutex

375c01c17d154679

Attributes
  • reg_key

    375c01c17d154679

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.40f07bdfb74e61fe7d7973bcd4167ffefcff2f8ba2ed6f82e9fcb5a295aaf113exe_JC.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections