General

  • Target

    d77d3e0052129839fa43bf004a6e584e33b827bc74a62f9e395ceeeb3a7d1adb

  • Size

    10KB

  • Sample

    240419-v16rdsaf56

  • MD5

    c741fdb51c679d5491fcbc0f0e06312d

  • SHA1

    f30ac942ad77e5b051a6c74f332caf2cfb106e53

  • SHA256

    d77d3e0052129839fa43bf004a6e584e33b827bc74a62f9e395ceeeb3a7d1adb

  • SHA512

    2183537ee5aa0a9e7f46fb2b052dc980c0f90e0488856e2410acdcdaa8039100fcec967a377a8b45f4b3b9d7f5b169c80ea5f85d59f7520199eb5aa9a21caf71

  • SSDEEP

    192:QJNbISlmEm9TMJm2sFjNVLjH84+cV4Mu46ignljd6XiAFXgbmt6QRyTAB4nfeBwC:Q3ISsIsRLjH8eV4MuJlj8Xrgqt92AB4C

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

adminplusnj.duckdns.org:5552

Mutex

f43862e4b8394

Attributes
  • reg_key

    f43862e4b8394

  • splitter

    @!#&^%$

Targets

    • Target

      679f08f99ce0e4c2b29e8fab194b74bb1073212279a8839786bcd037d286b1ba.exe

    • Size

      32KB

    • MD5

      d7c536b7ea269dd5bd29312da0b40315

    • SHA1

      76e213fd04a7706b9413592978bdcc39c17c5ea1

    • SHA256

      679f08f99ce0e4c2b29e8fab194b74bb1073212279a8839786bcd037d286b1ba

    • SHA512

      811fe522b8df38d6dbf2ab9ed238e173f67a8a530e0461f021c814ecf66253069daf1f2dade64b7363d97842d46b09be8c6c46a59db3885cc2b47d45f2ce8a20

    • SSDEEP

      384:d0bUe5XB4e0XuOd/w0Q0mS03AWTxtTUFQqzFjBzObbZ:OT9Buti55doBgbZ

    Score
    1/10

MITRE ATT&CK Matrix

Tasks