General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    cb2210ef676090de1d4abdc6abd15daf

  • SHA1

    e9e25de728ab27e0aa9a18caf40b25465a6ef8c1

  • SHA256

    7a384bb74dfe070f5954964c150d6b58c8439f90c7c2e681e662929f87bdc98a

  • SHA512

    b6e9feebf3615c7d7057bc4b8f8800ac7a46e7d76c47dd660ae45407aa6cde804f8be16ee4473ba155ced5424add033d3f5c8a710ad0dcf2651235753eb07ec4

  • SSDEEP

    1536:GT8oDnb4DNA7SSjHDrwsNMDzXExI3pmxm:XoDnEmOWHDrwsNMDzXExI3pm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

oxy01.duckdns.org:6522

Mutex

d00ea8c06ab02e78618235c9503b74e8

Attributes
  • reg_key

    d00ea8c06ab02e78618235c9503b74e8

  • splitter

    Y262SUCZ4UJJ

Signatures

Files

  • Payload.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections