General

  • Target

    8f7522c5cd05edaa7894e530161aecd5ca214e5e2ba745026812e65d700a2a01

  • Size

    10KB

  • MD5

    cbafe7de9a162f0a41fc38407588ce63

  • SHA1

    fd228597086f030b156007bfb410c93b9d3c6cdf

  • SHA256

    8f7522c5cd05edaa7894e530161aecd5ca214e5e2ba745026812e65d700a2a01

  • SHA512

    e9947921ddbd50ed08e52790819f8e49a88c5c3285a511ac4cd227c2df299eb32ce6aa31797d4f4d6000382fe2b478424f5994b60057c542356c7b19e00d5d2c

  • SSDEEP

    192:tUPdpuvOmURC57m1uIC31asRZQZC+jhYvtTH6vTg3z0ru1qF:mpuvTK9v21afxqvVHMTgYr/F

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

vbatallafinal23.duckdns.org:0101

Mutex

cc4c1a7fa6f54267ad

Attributes
  • reg_key

    cc4c1a7fa6f54267ad

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8f7522c5cd05edaa7894e530161aecd5ca214e5e2ba745026812e65d700a2a01
    .zip

    Password: infected

  • f0a35fc202dcdcee1c9f96c931dc2db671678f9aa031cd31fa7b745a92fa678c.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections