General

  • Target

    NEAS.3d20dba4364cbf513254a1fcf9fdffd7bin_JC.exe

  • Size

    93KB

  • MD5

    3d20dba4364cbf513254a1fcf9fdffd7

  • SHA1

    7db0f0376eae76a75121465708aa0a68d3e1bbc6

  • SHA256

    e86f833eca0abab0034a012642768055abd798a39ea086cdbd5e1896bab3f7d7

  • SHA512

    6f2984fc9f3e98b8f035ba53d3b470a494e880c077cf45cc94851815663f5607774e1be14ada483dc5f04e03de20f5bf17dad835815d0c281e9156eb64fc68e8

  • SSDEEP

    768:eY3JUnD9O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3GsGI:DUxOx6baIa9RZj00ljEwzGi1dDiDSgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

7.tcp.eu.ngrok.io:17898

Mutex

5f94b02d81dfc88581326ca5c3feabe4

Attributes
  • reg_key

    5f94b02d81dfc88581326ca5c3feabe4

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.3d20dba4364cbf513254a1fcf9fdffd7bin_JC.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections