General

  • Target

    301e907c04fd9180cdaf7fbe5f40ee7acacc14ca6d537241766ef7f1981a0a15

  • Size

    10KB

  • MD5

    b65f05c930e562da2c640a5a2dbe60d9

  • SHA1

    2d941c012009f7941404d2f442146462aa90e547

  • SHA256

    301e907c04fd9180cdaf7fbe5f40ee7acacc14ca6d537241766ef7f1981a0a15

  • SHA512

    a8fb956904484e5675840bfb99f5e07c443d6f0e71bdc520a5b03ec2369dcd2c4008a0309b50da356308d1640c018089751eaf4927a24ab866db9f3c4a1f9677

  • SSDEEP

    192:ckVutqnCThQzcBzWh7FSMRwiAGpkBGexarDvHUJv7eWJgTkrUb:c2utqCTnE2pzxarIUbTkQb

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

20.206.240.63:1024

Mutex

ebdd193c56dc4f7

Attributes
  • reg_key

    ebdd193c56dc4f7

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 301e907c04fd9180cdaf7fbe5f40ee7acacc14ca6d537241766ef7f1981a0a15
    .zip

    Password: infected

  • 37fa44c49d2cb418eb330410cd381d4cff666ac719a52e5d5274a026581a994e.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections