General

  • Target

    bTFU.exe

  • Size

    32KB

  • MD5

    07235e5cc38995b69bdbcfad4380ad72

  • SHA1

    21609fa4970b9732b2a203436e015f0cccda6fba

  • SHA256

    5d94973c1721adf02c34669a00c29e5aae5010a71f79ca8ae16994edccec2830

  • SHA512

    20cf6313342d06531a7c2bc63a41ce610752630a9ed160214360c68c72c3284cee494827dcbd9623335a17c1e29f7a383fed9a5434c2f907839c1d5f4e284263

  • SSDEEP

    384:U0bUe5XB4e0XnOfOaixBr/QxWTOtTUFQqzFOObbe:xT9BuOjifrYXAbe

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

patria.duckdns.org:1998

Mutex

85f10a8a09aa4

Attributes
  • reg_key

    85f10a8a09aa4

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bTFU.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections