Behavioral task
behavioral1
Sample
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe
-
Size
27KB
-
MD5
17342737aa4da913d168e0c7a8f97737
-
SHA1
92a62d7222236de3c089a1efa103dae56a56abd5
-
SHA256
1b5623a3835cd779d255c177b644fb731f093fc60c8e73e7fd57e2330e85c214
-
SHA512
eb46a1bef25797a0ebf035708e5654c2a6b6638d6399926144fc22b6b7e2d628b9ea8b7f381546e2e7ec15ac57901316613a6ca05d60033c9465a3e2bf9ab991
Malware Config
Extracted
Family
njrat
Version
v2.0
Botnet
HacKed
C2
2.tcp.ngrok.io:10434
Mutex
Windows
Attributes
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
Files
-
1B5623A3835CD779D255C177B644FB731F093FC60C8E7.exe.exe windows x86