General

  • Target

    d20a2f488e6b5c20cd8ada381358ce55.bin

  • Size

    10KB

  • MD5

    4c478e4e34c3029fedaf5bcc427f85fe

  • SHA1

    2f7b24c16a7d5b0606253ecbad3844f412fdc9fc

  • SHA256

    b4850aa97ba246704f67b96ffacba012e2719c3f009948749f447e0682bf2df5

  • SHA512

    56e25b8620f0767dca2586ea402d49c11de4a3b88fc55b30262e1f695ffc2ee17da09f53ced86b1355c953f3e4192c4770ef4d6aade51e7cb6f20c92a7ea9f46

  • SSDEEP

    192:w1JsaCk1ILbOKHJExUqLfQOjM7iS6Wy2YW8JU8mOYfOrbIpogOZWQLN8v:wEaRIbFESqzDjM7iSA20J9YfOvIiVWQ8

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

newintento777.duckdns.org:5556

Mutex

8cea1a13187e4

Attributes
  • reg_key

    8cea1a13187e4

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d20a2f488e6b5c20cd8ada381358ce55.bin
    .zip

    Password: infected

  • a1b6543b06333e8b8b6a90122c36e069d369a0742f5203e17c4c45fe5353e764.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections