Resubmissions

31-08-2023 11:07

230831-m716gsec8s 10

General

  • Target

    dskjdfkjlfkjdjfldkjfldjfdServer.exe

  • Size

    93KB

  • MD5

    6c235ff3554af119cf5a38c0e519f5fb

  • SHA1

    7457de3999900fa76a896ecd5d12ab09ab750dde

  • SHA256

    301a6fb626b71f2e471121fbc36042dc31a720cb79d85842773a4d4cfeade1a2

  • SHA512

    4be7c20f7ce89fbff64ca34cc115542e7492b0cfb22639828b1d4d23da7b77e2c988215e35b3b25de66a28e3cfff5ae69c1bdd3c0b24fa66b0d0f908043aeaae

  • SSDEEP

    1536:6UNJD/HBZbszKu9AZpE7r1jEwzGi1dDoDqgS:6UUzK4AZCHCi1d2v

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

tcp://4.tcp.eu.ngrok.io:11298 :11298

Mutex

46cd80c365e33ea1d918243f556490ee

Attributes
  • reg_key

    46cd80c365e33ea1d918243f556490ee

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • dskjdfkjlfkjdjfldkjfldjfdServer.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections