General

  • Target

    32859b5ec3b7864e3b2e074d6cb56fb85a005d2c4894464786ef1a725e8a1f43

  • Size

    10KB

  • MD5

    a3cb75deb272ec89facef1e678dbedbf

  • SHA1

    0fb40420b1563ac8f4a274da06e570a5a3ada4a4

  • SHA256

    32859b5ec3b7864e3b2e074d6cb56fb85a005d2c4894464786ef1a725e8a1f43

  • SHA512

    059c648b892038403ffe921addcb1c710f20e6dc3686908bde17d56c0df0662c8c3582f239286bb5a41dee164e1c0cfc027522e8322cb2cdb29caa89e0bbbceb

  • SSDEEP

    192:w45jOMseit3V0CIueJWgwkFEkJScW5sauscdlCx9qhZYcChj2pTBpKaEu:RzzilV0CIueJqkFg5PPcXphZYzNS36u

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

serverupdated.duckdns.org:5552

Mutex

07779923a5f5469b839

Attributes
  • reg_key

    07779923a5f5469b839

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 32859b5ec3b7864e3b2e074d6cb56fb85a005d2c4894464786ef1a725e8a1f43
    .zip

    Password: infected

  • 8c66f7abae263de14d58d0d5ee7a1de69b98994eedcdcbbdef9ad2ffea22f475.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections