General

  • Target

    5648d830f17c16b7d93bf4c3d1a2ba389d0dcdc97dcbb993bd52dee66938e300

  • Size

    10KB

  • MD5

    bd26e59fb2a8abe22780c3bc90a540a9

  • SHA1

    a770ec84a71d88dba84d1439b64774e2b58f3086

  • SHA256

    5648d830f17c16b7d93bf4c3d1a2ba389d0dcdc97dcbb993bd52dee66938e300

  • SHA512

    2355d23cfe74bd35c08dc95e9eb4fe2a5039e366782c617d9f263d7303961ae0cfb157056a7f0c2c13900d84d3ee9c5ef8dd3fcc49d4270d14e66c37515deba2

  • SSDEEP

    192:2XSpU4J8GGictPKHnFoBhjm5FTDTzWiV3gSSbj3OmaPhCvB025d2NEkMjOyHj:8SpJ+9CHnIVmFfqiVQSSePPh+02jWFc5

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

patria.duckdns.org:1995

Mutex

654d824fdca24744

Attributes
  • reg_key

    654d824fdca24744

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5648d830f17c16b7d93bf4c3d1a2ba389d0dcdc97dcbb993bd52dee66938e300
    .zip

    Password: infected

  • 7d86de2d2e6cd118653666fd446f52370e890e3f72ba30de620abdea1f514822.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections