General

  • Target

    7c7ba89ee3046a45f2fbec7bb10cc437782bdd347152fb47199a776a75756a90exe_JC.exe

  • Size

    37KB

  • MD5

    27f40a5673ac55f47d781331ef416de6

  • SHA1

    2391e533a1c95f8fd20ee73cac60f5971bdd9f0b

  • SHA256

    7c7ba89ee3046a45f2fbec7bb10cc437782bdd347152fb47199a776a75756a90

  • SHA512

    dde5c40ee024a7a6e5a872f6ef1b2e102dfd9e9e2dbe1bea2810cdc738ee79b0ee5bc4d1330aa1ec4abab74bff1899ec5103acc4154cf97c1a13da875904b08e

  • SSDEEP

    384:8kqBkiyjnDNGRn5IyUvapIrPbh+/VsIt6xrAF+rMRTyN/0L+EcoinblneHQM3epW:X35M5jUvairANsIQxrM+rMRa8NuCzt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

6.tcp.eu.ngrok.io:16370

Mutex

49b2f82cf7c6d0d824497230af0610af

Attributes
  • reg_key

    49b2f82cf7c6d0d824497230af0610af

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7c7ba89ee3046a45f2fbec7bb10cc437782bdd347152fb47199a776a75756a90exe_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections