Behavioral task
behavioral1
Sample
0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b
-
Size
289KB
-
MD5
347ff437bff7fd078a6aa65c04620b84
-
SHA1
4c5f2b093cc9be24b61c4d83502f409b1e757f20
-
SHA256
0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b
-
SHA512
deb2dd636fa554879e90763a060a5f66b247fbe49bc18c70bbdae8b298916527651113d7123619feaf09f87004507d0a0cf0bb54499149589f3ea9badf75836d
Malware Config
Extracted
Family
njrat
Version
im523
Botnet
Vlad
C2
2.tcp.ngrok.io:18100
Mutex
02970e07dff67a33e67ace6d6dbcc09f
Attributes
-
reg_key
02970e07dff67a33e67ace6d6dbcc09f
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b.exe windows x86