General

  • Target

    blli.exe

  • Size

    36KB

  • MD5

    fc7f5eb759aded3eed89ef303090f3bf

  • SHA1

    1b1bb22afe5de6deb728d08271e18464e73bedf2

  • SHA256

    6f6652cece29e62b6b412ecd3b2606f8db17c105e99966cf68710b97d505267b

  • SHA512

    01964d551a5384f9f3ffb458b58c43920129937f52e9f043967089488c0ebb42eb4e162477b6c332f89e22d00484abee2b98a24a9e3b56a0e0f836d93f538d6e

  • SSDEEP

    384:qrt8oixJfl7OHg1Wykrnj3ni8G4P9lrAF+rMRTyN/0L+EcoinblneHQM3epzXMNi:it+R1NkrnjSN41lrM+rMRa8Nu6st

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

blue_linux

C2

5.101.21.20:1555

Mutex

8c301f68dccb3d0b1e639ec4005a137f

Attributes
  • reg_key

    8c301f68dccb3d0b1e639ec4005a137f

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • blli.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections