Behavioral task
behavioral1
Sample
aeb242a8f4b10dde2b9012e312f00955.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
aeb242a8f4b10dde2b9012e312f00955.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
aeb242a8f4b10dde2b9012e312f00955.exe
-
Size
368KB
-
MD5
aeb242a8f4b10dde2b9012e312f00955
-
SHA1
e4517b996a6e4ef077b952dd9bfbb2e70c1cba8e
-
SHA256
e72b7749fccfc2e3181f99d9c92bdca8080de4cb1f09c8c8423c60a3d41f5993
-
SHA512
3301efbd05381314f9fcd412524676776c6805678070ddee8b5e934a0e72da994c25278361ef386380cc089416cdea1f1a2abf3ef4b14f2106300db1ec15fcb3
Malware Config
Extracted
Family
njrat
Version
im523
Botnet
HacKed
C2
8.tcp.ngrok.io:12312
Mutex
4a0fa237240fa8f6245602cce20e810d
Attributes
-
reg_key
4a0fa237240fa8f6245602cce20e810d
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
aeb242a8f4b10dde2b9012e312f00955.exe.exe windows x86