General

  • Target

    bUBL.exe

  • Size

    32KB

  • MD5

    c0bf09b4829bef52bac3d6fc6758ccd9

  • SHA1

    964c2ee33ab5b14dafb08cf0c58e908467226487

  • SHA256

    b255d7d07da3fce68de66f3b0ea1cc08931e1f2d6514a19442e51269f2277e1b

  • SHA512

    929b5ca4b80115db96bc73eeb596cea902b002a8b970733d8b075c0bf0b6105dd71956f341771d3b4d5d89ccdd9ba809cb480882da87370b8f925032486cfb1c

  • SSDEEP

    384:v0bUe5XB4e0XzObWiaXLilpknDNWThtTUFQqz9MBObbx:ET9BuqZaXWlBibx

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

rusia.duckdns.org:1994

Mutex

f2887c56e8ee

Attributes
  • reg_key

    f2887c56e8ee

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bUBL.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections