General

  • Target

    bPHL.exe

  • Size

    32KB

  • MD5

    95c33f809c42134af6b3d546c7aa98d6

  • SHA1

    63e6b48ff74971f196d7dc28f2e2507c96ab70b3

  • SHA256

    71aeacef3a99e2b7af179a22756e00a03a610a8cf612bce2ed729c4067fb119f

  • SHA512

    9e996eb580e7bc9a641a99464614feacf65aba8d94bb00eff309ffdabdf51c9f1a2c59f7109f056af53c967e673bbcdabe36e7eb62050bb1ccdd8abfa26157b0

  • SSDEEP

    384:00bUe5XB4e0XSOfOLsw0Q0mS03AWTxtTUFQqzFLObbR:RT9BuRk555dNbR

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

177.106.210.102:5552

Mutex

4e1c335154444b0d

Attributes
  • reg_key

    4e1c335154444b0d

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bPHL.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections