General

  • Target

    f0d1d9b9927a8bf56d053ad4417dd063bb5b723fa1617a8596426454fdedf552

  • Size

    10KB

  • MD5

    92f95138dde3a5b84950fb62971cc643

  • SHA1

    3e56a39254afd52490ada22047d74099a85fa67c

  • SHA256

    f0d1d9b9927a8bf56d053ad4417dd063bb5b723fa1617a8596426454fdedf552

  • SHA512

    46958382e037696e3e39fd90a4018422c788c20cd7e68cad9bc2200a306246873a50826fc40bcc802d166620f073bd2fb71231fb419c8eb28605b7a97e3bd829

  • SSDEEP

    192:QP1KndbhRjt1IendODpx9VgGN4/bFFszm5GDQ5NhJ9nQEQYUh:QP1CVRjt1IOdOx7gGN4/bn5GDKNndsYw

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

serverupdated.duckdns.org:5552

Mutex

60f905afa1e84682bb

Attributes
  • reg_key

    60f905afa1e84682bb

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f0d1d9b9927a8bf56d053ad4417dd063bb5b723fa1617a8596426454fdedf552
    .zip

    Password: infected

  • 4ce97d20fdf83c2fac60b6660a08aaaab2f0e793fe9958cb2ab2c789e13c7a60.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections