General

  • Target

    xtcs93vhJPyI.exe

  • Size

    32KB

  • MD5

    537c3d243fefd14b9088c103b01757f4

  • SHA1

    f47cb00299bd417b18dc6c9145c49de332e773c0

  • SHA256

    6a0dfb4d844015c58af165c316ee35a7d6889e8fbf38dfa06329114a39a7e77f

  • SHA512

    28cfd2a5084ceab87fa52a9b557e55eb14ab2306fe8d2484483b9a12d09b36acd71d9c688befc9e079fe016ab559124cbaf32c130c29af404a99471a23753349

  • SSDEEP

    384:B0bUe5XB4e0XuOhbw0Q0mS03AWTxtTUFQqzFnObb9:aT9ButC55dJb9

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

parahoyestsidio.duckdns.org:5050

Mutex

2cd9c269e4b

Attributes
  • reg_key

    2cd9c269e4b

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • xtcs93vhJPyI.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections