General

  • Target

    remote.exe

  • Size

    93KB

  • MD5

    15b13bfe24bf9d998c54dc842662c57d

  • SHA1

    9e84b7a7a5597735a66bd16a3c8501fe8bb459d7

  • SHA256

    a9f403f5cf33185a272da297b048a58bb202a6f78df7bdd984bc4b3fc3701bae

  • SHA512

    524851a787deebfae7605d33079008ffd1f8914c0095cb9d7c1c08b63e010ce11eeb63ec5b9d32a0174a693a7bbbfef343be1a97571d6aa6aa3534d5aee08e49

  • SSDEEP

    1536:tajedxQJ9waK7jhJCQjEwzGi1dD3DHgS:tamQJ9waK7jrCBi1dXA

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

tr2.localto.net:38440

Mutex

e3d13c5827e6112bd693f1c7ed43b0d5

Attributes
  • reg_key

    e3d13c5827e6112bd693f1c7ed43b0d5

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • remote.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections