General

  • Target

    bUPt.exe

  • Size

    32KB

  • MD5

    b0f3ca4450a2f669b927ae1517dac1e7

  • SHA1

    7390d9dcd74c4c40f536c8f490f0ba1580523c77

  • SHA256

    81c18c346ad57ff5c4dc07fe51b0e9411704cb9df362aefd6d6275f6f9660d47

  • SHA512

    de72099a2b301b683534a163a4b3c918a035d1f2f2e25c714e5133b3ad3a62b201b14a200b3459cfa19ae339ec9035eaedd26be27fd70fe1db5b11e84b7ca936

  • SSDEEP

    384:O0bUe5XB4e0XvObfixBr/QdWTStTUFQqzFqObbm:fT9BumTifrYfkbm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

patria.duckdns.org:1994

Mutex

f179c84c13a

Attributes
  • reg_key

    f179c84c13a

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bUPt.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections