General

  • Target

    c92b6dfceea02e115c6f7e2019f287cf7a53274c3d2e50aa67da53425e195c4e.exe

  • Size

    32KB

  • MD5

    d91b3c66ac6558e5ef0dbe36b22eb5cd

  • SHA1

    83b64e73195cbc425d2fd61041b0f4649ca26ceb

  • SHA256

    c92b6dfceea02e115c6f7e2019f287cf7a53274c3d2e50aa67da53425e195c4e

  • SHA512

    775e0b5189cf12da1662e505f9eeb41568f7dd727263991710e45f936f1d95e386f55d39f2df179b0000fa47e07afb1afadd1852684f15d52f476332953607d7

  • SSDEEP

    384:Y0bUe5XB4e0XnOfOLsw0Q0mS03AWTxtTUFQqzF7ObbR:tT9BuOk555d9bR

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

powerup.dynuddns.net:6363

Mutex

9b20305c0c0

Attributes
  • reg_key

    9b20305c0c0

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c92b6dfceea02e115c6f7e2019f287cf7a53274c3d2e50aa67da53425e195c4e.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections