General

  • Target

    6f63ae5040ffe8045c6b3f6efbbf5c3a.bin

  • Size

    10KB

  • MD5

    400dfd77aeffa7118fcbba3804beb41c

  • SHA1

    e4c23820099c0b617888be0b608f6208d9f91bb0

  • SHA256

    a41c6f5744fd6892a2c05ce0ba154ea64795f74b653c3a3fc393e489590396e9

  • SHA512

    cf3e9bf749d3ecc1715e4c95340ab1ef5905139a45d7327a8fed7c38dc82f107aab27fdac9c4050809f8e7dc6ed76d4a70b5b41e2cd0a8f36650f56fc6de050c

  • SSDEEP

    192:E2WE6yNqNcKz5IpfWxtPZhoVi9jx5mPTlVcxqpscJFvH281uGglOdEMLloH8:E2ZBr2eetP352Tdp5vNXEPH8

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

medellin230.duckdns.org:3002

Mutex

2bccc4870a

Attributes
  • reg_key

    2bccc4870a

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6f63ae5040ffe8045c6b3f6efbbf5c3a.bin
    .zip

    Password: infected

  • d73b674e1bcd545b04f74778c20baa1e0687b1e3219efddaec0280d2b9216802.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections