General

  • Target

    5ec502d288ca460c3b0dd9e6e67fd390516a96ad36a37bce00e9a3da46b05665

  • Size

    10KB

  • MD5

    73186a14640a22f148fc4248d3c7e84b

  • SHA1

    0493a641d7b8d911fa4d0e1b1b54e1c69052e1e1

  • SHA256

    5ec502d288ca460c3b0dd9e6e67fd390516a96ad36a37bce00e9a3da46b05665

  • SHA512

    7848126b4c815a765c64c995f827c14446d0f067ea60f768de729c0dfb3eca7a44e1d81197dca86137cbce136291ed7f960295e90cc1fe9b7f7aa85f4074399d

  • SSDEEP

    192:x86o5S5sogmsnPXcaG28iEOL2q6ikSLlj7MFdxVV34CiDY5u/sk8eCHM:6ATsPMv2REu2jSLlXkdxPP0//8Ls

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

serverupdated.duckdns.org:5552

Mutex

60f905afa1e84682bb

Attributes
  • reg_key

    60f905afa1e84682bb

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5ec502d288ca460c3b0dd9e6e67fd390516a96ad36a37bce00e9a3da46b05665
    .zip

    Password: infected

  • 4ce97d20fdf83c2fac60b6660a08aaaab2f0e793fe9958cb2ab2c789e13c7a60.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections