General

  • Target

    3947a0556c4159f49b9a7f9d23e2b4f5.bin

  • Size

    10KB

  • MD5

    7758f7de7c2223a5ca1dbe86067a55d0

  • SHA1

    1b8a0f725298ac7c12ad71206770f76205c25b36

  • SHA256

    ec96711139ec3c09b117ef0120db0647ec1361a3acde00eee03941cf7da024ae

  • SHA512

    18b29b89a89fe4f3c4b41f94fae5e7df250e6c9c5862093c56f7133a739adf680180428e99f0e15f5ff3e39cafe9f60b74561011fad4cd7c9462ab2a4b75fc66

  • SSDEEP

    192:vY0+mTgm5RJMZTieXeQC5iyDp7YOWvFuW1ttEXNuiETqZ2YpLz/44r:vYugsJMZTi4eQkpEFf32uiEs2YpX/hr

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

1.tcp.sa.ngrok.io:21422

Mutex

375c01c17d154679

Attributes
  • reg_key

    375c01c17d154679

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3947a0556c4159f49b9a7f9d23e2b4f5.bin
    .zip

    Password: infected

  • 40f07bdfb74e61fe7d7973bcd4167ffefcff2f8ba2ed6f82e9fcb5a295aaf113.exe
    .exe windows:4 windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections