Behavioral task
behavioral1
Sample
a31e6ca5620db4da55f0ad19e6ce16ef.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a31e6ca5620db4da55f0ad19e6ce16ef.exe
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
a31e6ca5620db4da55f0ad19e6ce16ef.exe
-
Size
37KB
-
MD5
a31e6ca5620db4da55f0ad19e6ce16ef
-
SHA1
76977e85c771c15beb0e68054d372528013544fd
-
SHA256
5c4644f3f478085f4731a7cb10da859599837a8f5315be6d9e549029bc5c5892
-
SHA512
7d767df06e4df25af4cdee1526d8bc5e158748a7bd9ca56e6af571f06e1508e616b274f996a23e242f8ec6c42dab06663e5d1a341596d5fd84804d526dc6de08
Malware Config
Extracted
Family
njrat
Version
im523
Botnet
HacKed
C2
4.tcp.ngrok.io:12732
Mutex
9e02680d81daa6109823601d69f471c3
Attributes
-
reg_key
9e02680d81daa6109823601d69f471c3
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
a31e6ca5620db4da55f0ad19e6ce16ef.exe.exe windows x86