General

  • Target

    d5f7527a0fe39690c1f439e25a1d62184bb2ad77d65e35d0ff266e3ba027fab2

  • Size

    10KB

  • MD5

    559286282ccf30f07f73ba1ba95409e3

  • SHA1

    65d13ab9c3e655890b9b558e2d6130c9be692458

  • SHA256

    d5f7527a0fe39690c1f439e25a1d62184bb2ad77d65e35d0ff266e3ba027fab2

  • SHA512

    2c7dcf209e6a845826b218b5f21e1af1adac40e208183ac0a5225e2cb826265b43d6f2b873e5614459d56747d5913cd4029e12b20167a20bd83ea3c419c38ffb

  • SSDEEP

    192:PYiYwC5Xfagi2hzqXt7YmGSSPMzMcLOwJZOFriUzbc6JHVylEAdWB5BPfk7CF7rs:PYiYwC5va7/GHOMcLbJYFTzJPdNfk746

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

nuevosecua.duckdns.org:2054

Mutex

c1a86313623c4b

Attributes
  • reg_key

    c1a86313623c4b

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d5f7527a0fe39690c1f439e25a1d62184bb2ad77d65e35d0ff266e3ba027fab2
    .zip

    Password: infected

  • 8e9629451b8a090834f96bd6688184ad7a18aacd33784193f273c7796e3c01b3.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections