General

  • Target

    f7b26f4a5dfaf73360609be9908d8b2e9e32c7de31e6ac839de57f22cf02c9d3_JC.exe

  • Size

    37KB

  • MD5

    063b22af6de103aca839966231ddb120

  • SHA1

    d1e4da7376a0ba7712ab5375331a24535b5f0f59

  • SHA256

    f7b26f4a5dfaf73360609be9908d8b2e9e32c7de31e6ac839de57f22cf02c9d3

  • SHA512

    bd49181b97cb74a39611c5ffc74e508660d0676989521d91550940678585c4649ae1c67e34bfb920b565baa8fa225804801e706a951b54906194a34160b44541

  • SSDEEP

    384:Veg7GZgibDjpPu7w9qyMTsjn/7sWwzfrAF+rMRTyN/0L+EcoinblneHQM3epzX3t:xaNN9ZMTsjDtwDrM+rMRa8NuJnt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

5.tcp.eu.ngrok.io:19186

Mutex

36deb1d9a9c9def8a1d575a7938701e3

Attributes
  • reg_key

    36deb1d9a9c9def8a1d575a7938701e3

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f7b26f4a5dfaf73360609be9908d8b2e9e32c7de31e6ac839de57f22cf02c9d3_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections