General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    7c0df3917361e45f61976bb3e6e8dc59

  • SHA1

    f193988349d7a4b3af5ef88b3e055a0e802fb719

  • SHA256

    2915470840867049fae31bcac994e18266acfdfeb5f42344072e480533bb79b9

  • SHA512

    66a1ee9c14ac67c63c90dc0d2268f1b567226932a552a89cf3da002f9a2c1ffb478ea0fc412955f973532bcfc4dec2b87764711209f7ef735d21a839dab0630e

  • SSDEEP

    768:l646lOt1Man8E2N6FikUt34okSNrmwFvfu0YMDHPs3L7XJSxI3pm4m:l6LcDnCN6FikSJDCwsNMDSXExI3pm4m

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

oxy01.duckdns.org:6522

Mutex

8c47e740704afa553c0acf7809e56295

Attributes
  • reg_key

    8c47e740704afa553c0acf7809e56295

  • splitter

    Y262SUCZ4UJJ

Signatures

Files

  • Payload.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections