General

  • Target

    436f9707838083d743624e034f46dd515816b3f746fc856d88b7e0675b77e462_JC.exe

  • Size

    64KB

  • MD5

    16430de51019f3bf3b7c0d2909235825

  • SHA1

    2252ceb6da385bfcc991bde3b7263f8fe989e857

  • SHA256

    436f9707838083d743624e034f46dd515816b3f746fc856d88b7e0675b77e462

  • SHA512

    eeee9e414a9e161f8ba150792b8f598352bf42554d45cb6803fa3366fdfcb4aa67c3349d11baf63015bc8267fc6b4cc0f597faf86769dca40b0b94a1ca9ac870

  • SSDEEP

    768:QQW23OVvZVYzxDCPOm1+/CqEpvYeHQmIDUu0tiDhj3YrbE+5G9TI6m8fTftZN8sv:/+6SHq6vQVkEj3YrbE+5G9kfOTftZd

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

user

C2

2.tcp.eu.ngrok.io:10992

Mutex

7253ba5db9da21877c34b789bb86605a

Attributes
  • reg_key

    7253ba5db9da21877c34b789bb86605a

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 436f9707838083d743624e034f46dd515816b3f746fc856d88b7e0675b77e462_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections