General

  • Target

    0b45e73beaa00b13ce1207bb4a96733b6a0ca7a9ab358eeffcb49286bfb8538d

  • Size

    10KB

  • MD5

    78f2e4426d79b40756acefefebbfcfa1

  • SHA1

    15c1732029adf3b421763cbe02d8392fba490da6

  • SHA256

    0b45e73beaa00b13ce1207bb4a96733b6a0ca7a9ab358eeffcb49286bfb8538d

  • SHA512

    781e6f8c63dfe676637b0f17fd5bee26bf1c49cd278a3bececf59698312f85bc951d8a8808feedef8cf0a74081c55ea580360cb0a84f5c71b29481a478a46a9d

  • SSDEEP

    192:TMJYTSuXXLBQhIaXNvIXik7yMCWVbD3/Dtn1GAIJDtFUuBmHCYL/Z/o79:TQYTSABsr9cik7yMxH/DzNIJ5GuBmHNg

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

serverupdated.duckdns.org:5552

Mutex

07779923a5f5469b839

Attributes
  • reg_key

    07779923a5f5469b839

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0b45e73beaa00b13ce1207bb4a96733b6a0ca7a9ab358eeffcb49286bfb8538d
    .zip

    Password: infected

  • 8c66f7abae263de14d58d0d5ee7a1de69b98994eedcdcbbdef9ad2ffea22f475.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections