Behavioral task
behavioral1
Sample
153aa11c0f2a064fb60052efafe4d8c32c5eb172e519de1f00f0ebc383437f70.exe
Resource
win7-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
153aa11c0f2a064fb60052efafe4d8c32c5eb172e519de1f00f0ebc383437f70.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
153aa11c0f2a064fb60052efafe4d8c32c5eb172e519de1f00f0ebc383437f70
-
Size
43KB
-
MD5
de6e1f6111c63553ccbcd0a2d4bd9c76
-
SHA1
7070685facdc6fa41902ade8c7d49c8e19d3ffa4
-
SHA256
153aa11c0f2a064fb60052efafe4d8c32c5eb172e519de1f00f0ebc383437f70
-
SHA512
c434b1bf7aadf86d6d4bd748f514432566cbbcdfb254c88badfdb4ca27f3b01b9af6db9d8e42775ce8cff4ecaf399a4bf67bce92a5c1d24da80a87c505386d5a
Malware Config
Extracted
Family
njrat
Version
Njrat 0.7 Golden By Hassan Amiri
Botnet
HacKed
C2
127.0.0.1:5552
Mutex
Windows Update
Attributes
-
reg_key
Windows Update
-
splitter
|Hassan|
Signatures
-
Njrat family
Files
-
153aa11c0f2a064fb60052efafe4d8c32c5eb172e519de1f00f0ebc383437f70.exe windows x86