General

  • Target

    ce6f7c8df0dad57450740e901d08d2276e568ec5c00f0c479c9dddca68882584

  • Size

    10KB

  • MD5

    bdaf3aaee8d6ba4c1d8e9eb3ffe254a4

  • SHA1

    51f269f15a4e742ed503c0218d2db9e2fa702dc9

  • SHA256

    ce6f7c8df0dad57450740e901d08d2276e568ec5c00f0c479c9dddca68882584

  • SHA512

    f7323cee5d0b474a22defa550b23cbe05e6c81c81579c81138ce4527315b3f4414200439b88f8d71738b4f4f065632bd2a7a270974a2a2243fe3686c8f2efe79

  • SSDEEP

    192:XbXp6uH0+sacAt7PS2cMqwrbT4NinmO3qT8bCfKqV+hzhpPfvlNavV:XThsacACvmbTuDT8bFUKz3lNavV

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

parahoyestsidio.duckdns.org:5050

Mutex

989d2a43a7

Attributes
  • reg_key

    989d2a43a7

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ce6f7c8df0dad57450740e901d08d2276e568ec5c00f0c479c9dddca68882584
    .zip

    Password: infected

  • ac263488b03f9562a9f6144a7c1fa5403a3b61351aa33545302f8afdd52726ef.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections