General

  • Target

    f48b490bdefcdca74a47473fc5032993ce8ec635692a198c01974937f0d30085

  • Size

    491KB

  • Sample

    240829-qxyjdsvajf

  • MD5

    3350728aa68618454abc5ebf65c271a1

  • SHA1

    2e079e508103585146e436b8d88797970062ebff

  • SHA256

    f48b490bdefcdca74a47473fc5032993ce8ec635692a198c01974937f0d30085

  • SHA512

    1b0cfc90dd22e8ba1c119d8725c47a4f47ae791214db73a154fee52b5a0858c297f6df8c0d34a47f0a5435228004298e4e82c2060e4b55f3e231179f89269bab

  • SSDEEP

    6144:pJrMyidYe9ZbriOS0DPzOGyP/kGtLjEoNHjdlpahaebntLFfrSJKmAmhE91mElyV:vORZfiO9ePLjEahKhaWtpX+iPlGrxrx9

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

seznam.hopto.org:5050

Mutex

ceeee3035a224

Attributes
  • reg_key

    ceeee3035a224

  • splitter

    @!#&^%$

Targets

    • Target

      d16616d26359ce78ba338cf5be7c3164192dfe925adfb2cbcb75867a6201d25f.exe

    • Size

      783KB

    • MD5

      199896ee4e50a627e6d3c0d90d0bf2e9

    • SHA1

      2628502df5019d9009f71688fab3a78ee9c6dd3a

    • SHA256

      d16616d26359ce78ba338cf5be7c3164192dfe925adfb2cbcb75867a6201d25f

    • SHA512

      7eb7194e558439ee002c695d86806e3788d4cb9b4007b7d5a12782650257148dbd24f29ca4a0d723bd2eea016a0bbc8614db518958cd1c6ef55ef39af3c15eb0

    • SSDEEP

      12288:JvMcaUftEh+xwv1mpPCFxcQu/pQ9L+eVsNL1AecVXxJmYm:JvMMteUw9yCFkQ9DVsN3ckY

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

MITRE ATT&CK Enterprise v15

Tasks