General

  • Target

    400f00d600f464e055cbcd68982d05c3.bin

  • Size

    10KB

  • MD5

    7c7030431669bc57325271f94a87eb44

  • SHA1

    d101ee63c6153c261da8989204cf04ebaaaff0ce

  • SHA256

    3a4b943e978e3a4ed50b8b347e3811f184feaf8ddcabae9a0c9b2c995bc95bab

  • SHA512

    e253a9756029ca9cfa836127fd89f69e05471a6f22655eab59ad716bee20512d9f57093b972c242ae75dc80d6f6c81ad885a6259841e92aefe5dfc99b73562cc

  • SSDEEP

    192:AzALgVg8uok9Pl3Xl/LHPLBmigJuexTte+IjwMPGCE7gY0RvosIAlLWzC:wAP9Pl3V/LHPLIi+x5e+tMPGPA9rn

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

berlyndnero.duckdns.org:7771

Mutex

b1f0646b29ce

Attributes
  • reg_key

    b1f0646b29ce

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 400f00d600f464e055cbcd68982d05c3.bin
    .zip

    Password: infected

  • 86a385af82154816c819180b7501f5c614f442482957599b56a7932eb6691135.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections