General

  • Target

    1fa56caa73edcc2ea34d86780a3d07a72126593e12648b302d20403814b7ce4c_JC.exe

  • Size

    53KB

  • MD5

    384b9216322f5fd70b961970ac86750b

  • SHA1

    7aa1a0d4f9e169def8c0963311ce0a03acd9f5b9

  • SHA256

    1fa56caa73edcc2ea34d86780a3d07a72126593e12648b302d20403814b7ce4c

  • SHA512

    199baee0d8a79352167a0e7ebc5f58e3f4376152c77180b65fcf2e579211d591f54f1a25110eef14ac798437d1e8b956873fb88e3e36813511553179c129518b

  • SSDEEP

    768:KKXTZ38f7CTv8Fw4rM+rMRa8Nu9qtZZww:KiTZsTCTv8uD+gRJN+M

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

2.tcp.eu.ngrok.io:14265

Mutex

5951ee6e04d8b94616cf133a61795697

Attributes
  • reg_key

    5951ee6e04d8b94616cf133a61795697

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1fa56caa73edcc2ea34d86780a3d07a72126593e12648b302d20403814b7ce4c_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections