General

  • Target

    RAT.zip

  • Size

    210KB

  • MD5

    6c332c4080b9bd4c6f0c93e7df2a5579

  • SHA1

    aea733d264b316d0d6b73e63e6b7821fcd60e2c2

  • SHA256

    5dbe609189c864fe2e6b64a4f5e6946dee8ca6114935f4d63c10a1a4aadf5ac5

  • SHA512

    68eaa1ecbf483a7ab04357e35765ba7db9520fa0fad01612fd4ad8106c58883d73b33cc3090e5e645d0d3a04c5a3efc194cb980555b20b8c639e268ac963af09

  • SSDEEP

    3072:SBEfJooF4z495HM8fBUpZs+9sluHiI5jTBwalx7kka9XOdu+f+UFFnsxp7x4f/i:Sy6TF8fqAuf5jtwa7kkae+UXsXx2/i

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

qwis

C2

8.tcp.ngrok.io:13546

Mutex

996590c787bcb044186ceeb1f22c5778

Attributes
  • reg_key

    996590c787bcb044186ceeb1f22c5778

  • splitter

    |'|'|

Extracted

Family

quasar

Version

1.3.0.0

Botnet

John

C2

202.2.12.13:4782

Mutex

QSR_MUTEX_CxO1HuVkIgYkhY4NA9

Attributes
  • encryption_key

    s52dOq4uyyE0qGeD9OKm

  • install_name

    updater.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Java updater

  • subdirectory

    Java

Signatures

  • Njrat family
  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • RAT.zip
    .zip
  • RAT/0db272a5b1ecb842f4b7bf403dca51f9.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • RAT/Contact Card.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections