General

  • Target

    bTgk.exe

  • Size

    32KB

  • MD5

    935b4f91cd79ec1d023f6071bcf5b584

  • SHA1

    18ae42c6fd7fdb44e81e9b4cd93d547e7e81fc99

  • SHA256

    01602f727c84ee7e11e3684c0886fc03f4c45980ecfbfbd361a7023aafc1330d

  • SHA512

    9ecaa4631431d23251b488875512c74e1e0ab613dc25ea2ac2db7f96a67ce986d679e7e5da3b0508a069e295f898760838dab767bc369765e6b116ac778bc764

  • SSDEEP

    384:u0bUe5XB4e0XJgONvw0Q0mS03AWTxtTUFQqzFBObbJ:/T9Bu9C55d/bJ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

20.201.119.163:1026

Mutex

d2d3a9d803ab47

Attributes
  • reg_key

    d2d3a9d803ab47

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bTgk.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections