Behavioral task
behavioral1
Sample
f57f259be472547528dc421b04e7bf50ca2e294db4996adceb180e3266324ab2.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f57f259be472547528dc421b04e7bf50ca2e294db4996adceb180e3266324ab2.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
f57f259be472547528dc421b04e7bf50ca2e294db4996adceb180e3266324ab2.zip
-
Size
19KB
-
MD5
d5634dbc6f8f32c84e1884f8a6d00a9c
-
SHA1
d35bd3b33fe382ea7f7b72b05bd84d97192f6cd4
-
SHA256
a777dc32909adc0304243b0cf15c0d4608527a9b0428720989c470c89caf1902
-
SHA512
b8bbcbd796140fb79fa9a2a6ba4f3bb54d1492eca49789cb4cd0c9cbd6716975209e51d46c5e95f9fe8f1c263dd9ec9ee671ac60701dad7f710fabe079c3ed08
Malware Config
Extracted
Family
njrat
Version
im523
Botnet
HacKed
C2
127.0.0.1:5552
Mutex
827924c566a98e69ae497b27a2d29f65
Attributes
-
reg_key
827924c566a98e69ae497b27a2d29f65
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
f57f259be472547528dc421b04e7bf50ca2e294db4996adceb180e3266324ab2.zip.zip
Password: infected
-
f57f259be472547528dc421b04e7bf50ca2e294db4996adceb180e3266324ab2.exe windows x86