General

  • Target

    Client (RAT).zip

  • Size

    14KB

  • MD5

    68faa1d263aee9db32adb4cdc53052b3

  • SHA1

    3425ab7bd41e8d35900f971e71089626b2955572

  • SHA256

    0c2df7f3fa4865bf41198bea7aa98fc1c263a53d657de0ea2a84288be5895a16

  • SHA512

    723ca0afa5b5e6f0f946b1be4490da3abcbe1e59ea0da967e6db952c794b1b8ff92a815a56ff2b5358c937afb666ebe742f6f7e3f2b25d082f38a49686ae4b9a

  • SSDEEP

    384:jaPJei4z82qe7tHyJjkcY9CxRPpRfDTIWaqvHFMCU2qBCJFK3qtXHIrtt:jaBy8qGkcY9YPpHaJjcJF1IL

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HaCkED

C2

5.tcp.eu.ngrok.io:19544

Mutex

144402faa8d005eaa62e8bd44a11e83e

Attributes
  • reg_key

    144402faa8d005eaa62e8bd44a11e83e

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client (RAT).zip
    .zip
  • Client.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections