General

  • Target

    d77d3e0052129839fa43bf004a6e584e33b827bc74a62f9e395ceeeb3a7d1adb

  • Size

    10KB

  • MD5

    c741fdb51c679d5491fcbc0f0e06312d

  • SHA1

    f30ac942ad77e5b051a6c74f332caf2cfb106e53

  • SHA256

    d77d3e0052129839fa43bf004a6e584e33b827bc74a62f9e395ceeeb3a7d1adb

  • SHA512

    2183537ee5aa0a9e7f46fb2b052dc980c0f90e0488856e2410acdcdaa8039100fcec967a377a8b45f4b3b9d7f5b169c80ea5f85d59f7520199eb5aa9a21caf71

  • SSDEEP

    192:QJNbISlmEm9TMJm2sFjNVLjH84+cV4Mu46ignljd6XiAFXgbmt6QRyTAB4nfeBwC:Q3ISsIsRLjH8eV4MuJlj8Xrgqt92AB4C

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

adminplusnj.duckdns.org:5552

Mutex

f43862e4b8394

Attributes
  • reg_key

    f43862e4b8394

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d77d3e0052129839fa43bf004a6e584e33b827bc74a62f9e395ceeeb3a7d1adb
    .zip

    Password: infected

  • 679f08f99ce0e4c2b29e8fab194b74bb1073212279a8839786bcd037d286b1ba.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections