General

  • Target

    TEST AGAIN.exe

  • Size

    37KB

  • MD5

    3e9302406621cc6437e80ab27435912c

  • SHA1

    e0cf66f85faa521c2c156b8f2c33cdb0f3fe32cf

  • SHA256

    c39cf9e770d56dde272b287d62f9b0c26d2dc2011959f955fa474e36f9701b4d

  • SHA512

    bc8e26fb63642265d304dd3f7c4cd04e040bd68d3d88de6bfa37a56a185839be19a80c697bc0608dde34dd8ea9e6d4985b9ea52e1820dcf5ae2a35f595ba9ffb

  • SSDEEP

    384:CLI2+yik52zIuMXY1uyZD7xq8knJMsu2DXrAF+rMRTyN/0L+EcoinblneHQM3ep3:5EY1lN7E8kmt27rM+rMRa8Nufbt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

L indian scammer ezezezez

C2

chapter-julia.at.ply.gg:17779

Mutex

05c7991f41f0713de8f0f8ccbcce7e85

Attributes
  • reg_key

    05c7991f41f0713de8f0f8ccbcce7e85

  • splitter

    |'|'|

Signatures

Files

  • TEST AGAIN.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections