General

  • Target

    bSMK.exe

  • Size

    32KB

  • MD5

    9a72b511b1fd2078683373002076714c

  • SHA1

    9a3f1bbfea7cadf1dfbfc9db2496407ae39527d0

  • SHA256

    086f335efce2f5cc6171e0d707fa659e1db7b282195df9bf28c054a01337f8a1

  • SHA512

    6791acc4556a673e573b07a050d5c49e49599d3bd688fced70daaed776d6b048f2343d9e76e41890ed79ec50a7270b13a7ba4b0cf1f19f090c8f273ef010bbc0

  • SSDEEP

    384:M0bUe5XB4e0X7ObGANuiEO0YadWTitTUFQqzFMObb6:ZT9BuC6guiEYqOb6

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

pradera.duckdns.org:2054

Mutex

559b0f250b

Attributes
  • reg_key

    559b0f250b

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bSMK.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections