Behavioral task
behavioral1
Sample
e64dc8b80b5d447b520f557781acb0b3d539c92e6919de4b376ef1cca9af953a.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e64dc8b80b5d447b520f557781acb0b3d539c92e6919de4b376ef1cca9af953a.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
e64dc8b80b5d447b520f557781acb0b3d539c92e6919de4b376ef1cca9af953a
-
Size
385KB
-
MD5
22efb002ff6995db833e92bc0e151613
-
SHA1
fe78c82bf566f4c54b32474917b13b66ef1c11ff
-
SHA256
e64dc8b80b5d447b520f557781acb0b3d539c92e6919de4b376ef1cca9af953a
-
SHA512
7218abb399f75d81bf0eb5bd41f62eb5ba648632ea49818598791ccdff002fb4770214c0efd08517faa3d622ac8ababbeb1e50e5768787f2988c2eeb9a5c3202
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
almammory.hopto.org:5552
Mutex
afc92bf1571988bf5da2e394256896ce
Attributes
-
reg_key
afc92bf1571988bf5da2e394256896ce
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
e64dc8b80b5d447b520f557781acb0b3d539c92e6919de4b376ef1cca9af953a.exe windows x86