General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    bacd71cde434bbcd65ade4a72166bdc8

  • SHA1

    f08fdb959146d40b3b11a6857d359aed2358a626

  • SHA256

    fbc2e8449692fb697f1b3e9eb92c22d42885c591fa305af47e950e641565bca4

  • SHA512

    a034316a82a63802f6fcdcf66bf3efbc2196be250508e67114ef3fde0e6600fe030f2eafb614e184c21430f515089ec7e4e48d40aa2afc8f6427c0c143351b2d

  • SSDEEP

    768:aJa6lOt1Man8E2N6FiKUt34okSNomwFvfu0YMDHPsIw7XJSxI3pmWm:aJ1cDnCN6FiKSJDNwsNMDWXExI3pmWm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

oxy01.duckdns.org:6522

Mutex

1e098f80813489282fb7a626a72cebbc

Attributes
  • reg_key

    1e098f80813489282fb7a626a72cebbc

  • splitter

    Y262SUCZ4UJJ

Signatures

Files

  • Payload.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections