General

  • Target

    bMY4.exe

  • Size

    23KB

  • MD5

    6871449a52e2076a89a6c9279fb35475

  • SHA1

    de600d1a6a97cd29bd977cd0db2bddfc2a403e63

  • SHA256

    3cb22c29fad4b8369e7c77f5b7d7bf81941cbe57bc5df6fcadff39810234ee31

  • SHA512

    f54d35b0c8d2978e074e9cd8bea8a63c866af5db49badf17f4b64ec60ddb044b5c571e1731de9673875510d859dce3443eec8cb7d10216073952c2a7852b9fea

  • SSDEEP

    384:ocqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZVVJP:X30py6vhxaRpcnu2

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

0.tcp.sa.ngrok.io:15992

Mutex

785d4a30cbfbe3020699445b9503ac09

Attributes
  • reg_key

    785d4a30cbfbe3020699445b9503ac09

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bMY4.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections