General

  • Target

    34a328d86244b36e3009f2c7be69dc7d207f5aa0c721f21b4610445d42da97e0

  • Size

    10KB

  • MD5

    8280b9bc7a6f51c4a4a651662677146e

  • SHA1

    e93235608e1dd24f7525948631f3068e92fd11f5

  • SHA256

    34a328d86244b36e3009f2c7be69dc7d207f5aa0c721f21b4610445d42da97e0

  • SHA512

    28960336c98c9c6ec310d9f168601f035c6374d2ee594302d66f9fb5aa379c72bdc0ab9d12d47ea28f5a99e11219c4370b0a181c67c2677f3afc570e6f217478

  • SSDEEP

    192:Gsjdzm3kx4T+MZZtuwReDyHoXilE4w43w84MyY8PTheH7ezkrCbE3cfGT9:Gsjdzm3A4txuwMDyHyi2Y3ML7gH6S4GJ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

20.206.240.63:1024

Mutex

3129cd63c193

Attributes
  • reg_key

    3129cd63c193

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 34a328d86244b36e3009f2c7be69dc7d207f5aa0c721f21b4610445d42da97e0
    .zip

    Password: infected

  • eaa96c58f2e46c920ccca77cec3f195cb3be4b035df67eda3aef8a39176f532c.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections