Behavioral task
behavioral1
Sample
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe
Resource
win10-en
windows10_x64
0 signatures
0 seconds
General
-
Target
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d
-
Size
43KB
-
MD5
119fa29ca64f8a3be7b042bc75080c70
-
SHA1
f9e527da23c90f285441946fad023e072c5bfb44
-
SHA256
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d
-
SHA512
05b0cd698923a7cf7b5f7089b1b720a53f1f6c34a4d57642e7fe2c1cb7cb835ac0a8eda06b2c129145e8b2a4eccc5f97f610a85919e6ebae576b1e47d1b01c94
Malware Config
Extracted
Family
njrat
Version
Njrat 0.7 Golden By Hassan Amiri
Botnet
random
C2
8.tcp.ngrok.io:14429
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
Files
-
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe windows x86