General

  • Target

    40e7d21ac30faf402ddd621a4ac302deec0dec1a3f44be66184b540009f55b83_JC.exe

  • Size

    37KB

  • MD5

    1ee3243425927a385b006110185f20f4

  • SHA1

    56efed2f45d68698fa851f81919c5e1df664d5c4

  • SHA256

    40e7d21ac30faf402ddd621a4ac302deec0dec1a3f44be66184b540009f55b83

  • SHA512

    2c5642150c38666f3a78b72cee8a3a8c32e8cb000a6f658df024fc27470cbe778972a4a0ff4318fe15d21b418d56979e4da0f4ea21070ab021e4288a77f8557f

  • SSDEEP

    768:57rtsKADtOHiR4akrYBQWlly5rM+rMRa8Nu1et:57r8tVSkBQWlEa+gRJNK

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

2.tcp.eu.ngrok.io:11281

Mutex

844f4d291a60bc027b8ee2d7cdbf4348

Attributes
  • reg_key

    844f4d291a60bc027b8ee2d7cdbf4348

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 40e7d21ac30faf402ddd621a4ac302deec0dec1a3f44be66184b540009f55b83_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections