General

  • Target

    6e6094d1c0262938f445cd4c22e47111013f026666c79f35fcad56dcf7864162

  • Size

    10KB

  • MD5

    d44c05b4e4f9c41e6f535fbef60828f4

  • SHA1

    d2c903b6caa77feed37f8e51a3c07406087350a6

  • SHA256

    6e6094d1c0262938f445cd4c22e47111013f026666c79f35fcad56dcf7864162

  • SHA512

    6de908732e8876847ddd50e62d0293a1daa6982b297474cd11812cf949067fdf208c48d3d2293683c8e56750fd0f4da470b9a50350607703c4a3d1e913b0852d

  • SSDEEP

    192:TdJwf439rfk++KHzcDonHK5nxUnl4DPMsoiLk9Wsp+Z6iNpr5Q4Z7:TdawF13xH2xZDPvk7pa9taO7

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

resilencia2023.duckdns.org:2009

Mutex

5b5500a586a94

Attributes
  • reg_key

    5b5500a586a94

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6e6094d1c0262938f445cd4c22e47111013f026666c79f35fcad56dcf7864162
    .zip

    Password: infected

  • a95087358ad5a5bb460ce23972e7113402910f8c9b5235ab7def9e4f4934bde7.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections