General

  • Target

    7b4a3ed5ec60c24cafa7e84ea7c54563fceb4bae6e79462fc7ab12f64b90d92b

  • Size

    27KB

  • MD5

    6a25c8bec6ee34d0e78446c4ed79ec54

  • SHA1

    d0aadfc3d23f56209bc11b7b1753b5cb7996725e

  • SHA256

    7b4a3ed5ec60c24cafa7e84ea7c54563fceb4bae6e79462fc7ab12f64b90d92b

  • SHA512

    3ba628540e4f473e6c554715669a67be6ec23348723329824a38ab1c0b2163a681277b67ce9de80cc8385d5597728c8f5e8c1294c448c242a4a045b9a052a6ad

  • SSDEEP

    384:FL8kWj/+AU9878FtoexuaP39hRnMZAQk93vmhm7UMKmIEecKdbXTzm9bVhcaO6l1:FJcmsoXttyZA/vMHTi9bD

Score
10/10

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

0.tcp.in.ngrok.io:14104

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7b4a3ed5ec60c24cafa7e84ea7c54563fceb4bae6e79462fc7ab12f64b90d92b
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections