General

  • Target

    Payload.exe

  • Size

    27KB

  • MD5

    37398322d2b51367865356c9f1f6af18

  • SHA1

    a0ad9b0b91bc6d447038a9eaca3efe5d37bb356e

  • SHA256

    2345a8e2f0c32b524b88212dbac1f2a97de66abcccd4f88298a6dade7ca1eca4

  • SHA512

    f517b058f139fe2a288eb639783938a8fdf3b5a3d4496b99ce1b9673502cb7159599b1f91c7ee194a2bc69dde2bc64e9ced88edcd0b75917cdc331e385ee5bf8

  • SSDEEP

    384:tLplYHHeIYTzRRcbg8iEPrthZMVAQk93vmhm7UMKmIEecKdbXTzm9bVhca56xr6s:9fZxRm8VA/vMHTi9bD

Score
10/10

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

paul-positive.at.ply.gg:9693

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections