General

  • Target

    cecee6d38930d356cc3dc3adee0c2d6c8294e6adfa847a69e4e2584e2c2f4ad3

  • Size

    10KB

  • MD5

    39f8dc3aa753d9923ea30a756050be50

  • SHA1

    2593ae31a9dd36a4b74840c9998c14ab67021441

  • SHA256

    cecee6d38930d356cc3dc3adee0c2d6c8294e6adfa847a69e4e2584e2c2f4ad3

  • SHA512

    18ec65cecfc6e63b0b66b5757b48568c1b0c87a34784ab4c28368e49b49d8440f18b60f3ea22ef28908c72899fd75da01082f2a4539d1091b9f1255503c8127c

  • SSDEEP

    192:8JvNCiRPFxEXa3dOVatYmqc987QaN+REscwSPB33YXW4rNvw/2s+eOs33gBVX:Yjr8aBbqMbSPBH2ZrNY7+eN3gB1

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

microsoftdell1.duckdns.org:7010

Mutex

1c903f66e573498e8

Attributes
  • reg_key

    1c903f66e573498e8

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cecee6d38930d356cc3dc3adee0c2d6c8294e6adfa847a69e4e2584e2c2f4ad3
    .zip

    Password: infected

  • 4f359069c151d1dd983fb3a1c0bc68d95f29d32277026d5e229b2ca3e7d554b4.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections