General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    504ae4a4dacf0bf6b18c7ccbd69d7b74

  • SHA1

    b1422947f25ba4e1fc397c28ff4058226aaa5fb1

  • SHA256

    57225d9be1f7dc339f18689dbc9e243f6b89b3b4fc637ba39955606df48db417

  • SHA512

    c1d8f3d7afb0301b4775963eee895e7bfc9a0883cf20564a94a140b022759dfb46674746a81e2b94f58a26a8949a103caa3444a274c680b76a38026bdf164701

  • SSDEEP

    768:16a6lOt1Man8E2N6FikUt34okSNrmwFvfu0YMDHPs3L7XJSxI3pm3m:161cDnCN6FikSJDCwsNMDSXExI3pm3m

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

oxy01.duckdns.org:6522

Mutex

8c47e740704afa553c0acf7809e56295

Attributes
  • reg_key

    8c47e740704afa553c0acf7809e56295

  • splitter

    Y262SUCZ4UJJ

Signatures

Files

  • Payload.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections