General

  • Target

    1a11b3a80e7d51d6e3ebdd46d3d65e328fab2c55171ae0072cb31c3147cf76adN

  • Size

    32KB

  • Sample

    240927-gyfwasyemr

  • MD5

    cc3e512bb2aade7c803c490a6d3a94b0

  • SHA1

    bde19e0f35694b9e28fe19d9d7feca2bbbaa336d

  • SHA256

    1a11b3a80e7d51d6e3ebdd46d3d65e328fab2c55171ae0072cb31c3147cf76ad

  • SHA512

    3ddc700ca512b044171af19a0cb8b08c6c08b7181ec994d2c3680a4115fe7cc7cf81093b3cb9d580ab15de3088bf161f1dc7e02d1157770c2e46371230377e20

  • SSDEEP

    384:z0bUe5XB4e0XWOSSGHdqlzkB8N/MWTNtTUFQqzFgObbLV:gT9BuFSFdKPGbZ

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

comandoespecial2023.duckdns.org:7777

Mutex

0bea7f7a90

Attributes
  • reg_key

    0bea7f7a90

  • splitter

    @!#&^%$

Targets

    • Target

      1a11b3a80e7d51d6e3ebdd46d3d65e328fab2c55171ae0072cb31c3147cf76adN

    • Size

      32KB

    • MD5

      cc3e512bb2aade7c803c490a6d3a94b0

    • SHA1

      bde19e0f35694b9e28fe19d9d7feca2bbbaa336d

    • SHA256

      1a11b3a80e7d51d6e3ebdd46d3d65e328fab2c55171ae0072cb31c3147cf76ad

    • SHA512

      3ddc700ca512b044171af19a0cb8b08c6c08b7181ec994d2c3680a4115fe7cc7cf81093b3cb9d580ab15de3088bf161f1dc7e02d1157770c2e46371230377e20

    • SSDEEP

      384:z0bUe5XB4e0XWOSSGHdqlzkB8N/MWTNtTUFQqzFgObbLV:gT9BuFSFdKPGbZ

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks