Behavioral task
behavioral1
Sample
306437A282F51A0C6ECD6E3EAAB2EF9FC376973DA40AE.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
306437A282F51A0C6ECD6E3EAAB2EF9FC376973DA40AE.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
306437A282F51A0C6ECD6E3EAAB2EF9FC376973DA40AE.exe
-
Size
27KB
-
MD5
03aaaf240a48f950913695178125016a
-
SHA1
b7fe1523b02d05539f769f4beead332e5f0e18bc
-
SHA256
306437a282f51a0c6ecd6e3eaab2ef9fc376973da40ae0972bee7ea3839d0909
-
SHA512
6af11725e06efd01ca1429e567ca93d608436b165a23229eea623e25291967ce3f057af5c596974d86a5e0c55b38a27a0b121471f2b49cd25c543e77ce09460d
Malware Config
Extracted
Family
njrat
Version
v2.0
Botnet
HacKed
C2
zaki-botnet.portmap.host:5222
Mutex
Windows
Attributes
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Njrat family
Files
-
306437A282F51A0C6ECD6E3EAAB2EF9FC376973DA40AE.exe.exe windows x86