Behavioral task
behavioral1
Sample
ea6e1e414c8447ceb06f18ffe15fa3c0a25c51549339abd708b4241ff8dd848e.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ea6e1e414c8447ceb06f18ffe15fa3c0a25c51549339abd708b4241ff8dd848e.exe
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
ea6e1e414c8447ceb06f18ffe15fa3c0a25c51549339abd708b4241ff8dd848e.zip
-
Size
11KB
-
MD5
7712c1ee05658a3a526e4e8bc95c748c
-
SHA1
768314e8f728b17e827f3afa76a62c069013a7bd
-
SHA256
dc6f749e057f7d618633d16594f3713d8ca434fd9ecd4692dfa99cb5c2e96234
-
SHA512
0b59165ebf75cd3cf43664e208cbf326fe7e5b2edf0f504f020aa5548aafc119f6d5948e8aa7dbf5eb6f43a54b57d3b6f0951e018c95007447f7322f8d1ad60a
Malware Config
Extracted
Family
njrat
Version
0.7d
Botnet
HacKed
C2
172.20.10.5:5552
Mutex
ec10a8650967b67507124264e21a7053
Attributes
-
reg_key
ec10a8650967b67507124264e21a7053
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
ea6e1e414c8447ceb06f18ffe15fa3c0a25c51549339abd708b4241ff8dd848e.zip.zip
Password: infected
-
ea6e1e414c8447ceb06f18ffe15fa3c0a25c51549339abd708b4241ff8dd848e.exe windows x86