General

  • Target

    bRkY.exe

  • Size

    32KB

  • MD5

    84a63be283a33e794e2315b8f2c621a9

  • SHA1

    210c6a5aef55906ed2b0339f9ba661a50866ccc3

  • SHA256

    5ffec6ce889380ba59bb1b18adb5c95745cb7f8ea748bc3b90185eeba854fd44

  • SHA512

    7bdd8c6c0ee9708d32f732e0aff1deed4a5d2141f9dec4de2171b7c626896952b94d57cd6e4a775f2c017fab7b618bfa813799fc1fcb0be577096e7f4e760fab

  • SSDEEP

    384:A0bUe5XB4e0XqOzDw0Q0mS03AWTxtTUFQqzF2Obbl:lT9BuZ455dcbl

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

181.217.95.27:1024

Mutex

423116cb9872

Attributes
  • reg_key

    423116cb9872

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bRkY.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections