General

  • Target

    fe5673327be1a5e82fd02ff4075cdc9fc8bda0928a1cbcf22817573ca06cd9ee.exe

  • Size

    32KB

  • MD5

    14249a222b24fb2b5e7a16e85866101f

  • SHA1

    bc87e6997c94fc052b125bda64bc33b4e198c6bf

  • SHA256

    fe5673327be1a5e82fd02ff4075cdc9fc8bda0928a1cbcf22817573ca06cd9ee

  • SHA512

    bed67c9c58aff0e8de58ed47e298b200322fce8470e7b0de4cf9c8acb09d8471c65427e026c0e9d78eb1d181b76c71839f40062775056a46642d8004c68a9df3

  • SSDEEP

    384:T0bUe5XB4e0XGODzw0Q0mS03AWTxtTUFQqzF5ObbV:AT9BuVY55dXbV

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

negro2020j.duckdns.org:2020

Mutex

fd72376afd7

Attributes
  • reg_key

    fd72376afd7

  • splitter

    @!#&^%$

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fe5673327be1a5e82fd02ff4075cdc9fc8bda0928a1cbcf22817573ca06cd9ee.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections