General

  • Target

    file.exe

  • Size

    32KB

  • MD5

    f040d0ed0ed4902bedfe03e65c2b7a38

  • SHA1

    1a3dddce03f1bee23b2f31f6b22d65bbced7c6df

  • SHA256

    870874c51034d5a34e75dea92d7b84268d41bce6e5eef101fb653f28b9c7e859

  • SHA512

    ad0fa362965602bdfdb5adbefe73f694fb9960df5715d8b6e32a7f2c492fa1a05d5dde44e07f1b08fdac59aba66e219a45c0a4eab427393b8c87228fc9a06139

  • SSDEEP

    384:90bUe5XB4e0XtOVcVSjgkMNWT7tTUFQqz9RzObbJ:uT9BuU6VSje6kgbJ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

1.tcp.sa.ngrok.io:26994

Mutex

a84526b364f945

Attributes
  • reg_key

    a84526b364f945

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • file.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections