General

  • Target

    f8ddfe1964b109b0987c2262931b6623ac3335d306597355700696df50515d13

  • Size

    10KB

  • MD5

    e9ffd9051d1631cd2b037438485ef893

  • SHA1

    e6189f475f36ced3a628ae8efd8916e32557228d

  • SHA256

    f8ddfe1964b109b0987c2262931b6623ac3335d306597355700696df50515d13

  • SHA512

    e59fc83ab26ba5a369e447ea85564937d6ab6ea859459a974efffc8ab49de04ec52291166a421657565975ec44a2877203a1e3ff3ec467c25ec26a861a29f22d

  • SSDEEP

    192:H0m3kAS/Xkf3bc+3s+ZVI60Vwwke7bYEK8myOnEaNzUuU97emE:UmtS/XII+hclVwjWOTYuU97e

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

powerup.dynuddns.net:6363

Mutex

28a8ccde728a4c4c

Attributes
  • reg_key

    28a8ccde728a4c4c

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f8ddfe1964b109b0987c2262931b6623ac3335d306597355700696df50515d13
    .zip

    Password: infected

  • ee98deeca8c3daf8c538198639864c18677f59fd68bf130920c51af737bca710.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections