General

  • Target

    tes2t.exe

  • Size

    103KB

  • MD5

    687f3a96aca59c2749542ae85f2ab264

  • SHA1

    f3f862574df36c956a3e125af4a447bfe48ce3e5

  • SHA256

    8f8440b46a34b4c2cb1f4e4bb47e44ff638e081a64e6a3ef0ec513841406f16b

  • SHA512

    f62c9cb7f24bc6db551c1f3ebf25a2fccbfbf60c7ed8c403504e164bdb3cdbbcff057125cdd29c075ad5d117b74dc5889a7e32286145fa7c31b0a5cfe9efdf6c

  • SSDEEP

    3072:gcDn7MBJDCwsNMDwXExI3pm0GZpftMLBzP9yZs15l:gcnacvMa4KLBzPwZG

Score
10/10

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Client

C2

oxy01.duckdns.org:6522

Mutex

aff7a111f7a5dc993e55ad4fd0ae0722

Attributes
  • reg_key

    aff7a111f7a5dc993e55ad4fd0ae0722

  • splitter

    Y262SUCZ4UJJ

Signatures

Files

  • tes2t.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Code Sign

    Headers

    Imports

    Sections