General

  • Target

    0bc6ee6cb226f26ec7ff7270cb13b07421abb1e95c4c4c2b00dcbf6e6c32d397

  • Size

    93KB

  • MD5

    98925bd62fa200d17e64d6b6344d69bf

  • SHA1

    144f0e9581ea6df9becf072aaa8072fc092a1c95

  • SHA256

    0bc6ee6cb226f26ec7ff7270cb13b07421abb1e95c4c4c2b00dcbf6e6c32d397

  • SHA512

    a0795697b32a6f1b772073269e737a8fc32bffa3c792c1bc011ea2253f70d29fffd103250a6f15ad7698e95ea86df22fcd7099038ca4a0e732cddc888b07fd05

  • SSDEEP

    1536:pxwC+xhUa9urgOBPmNvM4jEwzGi1dDSDzgS:pxmUa9urgOkdGi1d8s

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

tcp://4.tcp.eu.ngrok.io:17346

Mutex

04d43eaa62b9c649279f27f84ba0f0be

Attributes
  • reg_key

    04d43eaa62b9c649279f27f84ba0f0be

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0bc6ee6cb226f26ec7ff7270cb13b07421abb1e95c4c4c2b00dcbf6e6c32d397
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections