General

  • Target

    59a15e2c0a04e3dfaa3817f01cc6aba53c58b34b48437bef7005ff3bbb936e56.exe

  • Size

    32KB

  • MD5

    7179bf027be44fadde85ec011e11ce7c

  • SHA1

    a676e347f43c0fddc515997ade5b02509bdd1fc0

  • SHA256

    59a15e2c0a04e3dfaa3817f01cc6aba53c58b34b48437bef7005ff3bbb936e56

  • SHA512

    af200694110357de06bbf91aecaabb19617956a5e3ae19925f7f2ce9fa69329874b06a2b07a065f24522b7c25905ddd7d274144c6400127dbf8a2f5d5af7c82b

  • SSDEEP

    384:k0bUe5XB4e0XOOPV4GeyWTctTUFQqz9zObbfG:hT9BuNWDaxb+

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

berlyndinero.duckdns.org:7771

Mutex

294df17303f34d1

Attributes
  • reg_key

    294df17303f34d1

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 59a15e2c0a04e3dfaa3817f01cc6aba53c58b34b48437bef7005ff3bbb936e56.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections