General

  • Target

    b37ce296a2fee86d2afd7ec92fd722253d4cbe226bd46938557e4b82e1de46c6_JC.exe

  • Size

    37KB

  • MD5

    424acbd9dd14618de61927fd05ca4da8

  • SHA1

    fd7ea433e0c2cb97e6d071865690b2cd7f857c72

  • SHA256

    b37ce296a2fee86d2afd7ec92fd722253d4cbe226bd46938557e4b82e1de46c6

  • SHA512

    1def79e8e0795c4273d5daf16e770067454bdaf880421257f75592eb36060fa204e1d8f2a1b2fd0b6c907d2a145bc10954a026b70176df92cc0117542f57bb79

  • SSDEEP

    384:D0SvEiTbTvpWNcZ0y8fvCv3v3cLkacparAF+rMRTyN/0L+EcoinblneHQM3epzX/:oS7TZ38fvCv3E1cQrM+rMRa8NuWEt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

7.tcp.eu.ngrok.io:14130

Mutex

16bdfee673b22aaab23ad2e970a8f13c

Attributes
  • reg_key

    16bdfee673b22aaab23ad2e970a8f13c

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b37ce296a2fee86d2afd7ec92fd722253d4cbe226bd46938557e4b82e1de46c6_JC.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections