General

  • Target

    bRQk.exe

  • Size

    32KB

  • MD5

    1257aa3a7c4ebcab95cf00c54565becd

  • SHA1

    1313d2c9cfaa7945bba0b7c41c2ddb9ef1cf1aac

  • SHA256

    91b1b82d19155a4028599299e72779af33147ef437bbe72055550fe8315ce8db

  • SHA512

    a5a9d615d81edfeca47146dffcc0bacd1d170f27096ad0d74e861db34efc0baf37453c63ea26b97ec8ceb4dda61fa13ac63124710b1578ccd5e22f01aab97afc

  • SSDEEP

    384:d0bUe5XB4e0XWOnPw0Q0mS03AWTxtTUFQqzFDObbZ:OT9BuFI55dNbZ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

puertocol20.duckdns.org:2054

Mutex

5fc9c87faad4

Attributes
  • reg_key

    5fc9c87faad4

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bRQk.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections