General

  • Target

    ef5ab7f0f4e7e83b532e082fe5c3458617f020b6b2ad6c83ffdb6f8ac2b1b37c

  • Size

    23KB

  • MD5

    6c1ca8fb6f463aa56f5f530480732880

  • SHA1

    817e4ed0453ecccafb94e89725e263b1d23c2c07

  • SHA256

    ef5ab7f0f4e7e83b532e082fe5c3458617f020b6b2ad6c83ffdb6f8ac2b1b37c

  • SHA512

    048b7b4b58c87814d2c713c43550d6db214e417b24c7757db53828b52ee90235c423dee451d9a4a4a3ca673a92e119b89b5661bd025211e231a58018be234384

  • SSDEEP

    384:8oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZW5:r7O89p2rRpcnuR

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

radea.ddns.net:5552

Mutex

416b0a05138d6a81c601d80709573203

Attributes
  • reg_key

    416b0a05138d6a81c601d80709573203

  • splitter

    |'|'|

Signatures

Files

  • ef5ab7f0f4e7e83b532e082fe5c3458617f020b6b2ad6c83ffdb6f8ac2b1b37c
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections