General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    ea1e58b0f02d63f34ef219295ab3fe7c

  • SHA1

    5a9e5e6528855b9ca1e4cc1b534c3975f9504ca2

  • SHA256

    2b10976f95071ec3954774de91b39f60cbc95c3243d66bc6399eda94f2abfef4

  • SHA512

    37f609c4184df731d663de1f966b1a56dee4167cd5e7580e0d94becbb52783d988a453941243f39cd81dc9792837d6f569522886012b052cb14d9a053c6eb07a

  • SSDEEP

    768:36a6lOt1Man8E2N6FikUt349kSNcmwFvfu0YMDHPs3L7XJSxI3pmGm:361cDnCN6FikSEDpwsNMDSXExI3pmGm

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

oxy01.duckdns.org:6522

Mutex

8c47e740704afa553c0acf7809e56295

Attributes
  • reg_key

    8c47e740704afa553c0acf7809e56295

  • splitter

    Y262SUCZ4UJJ

Signatures

Files

  • Payload.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections