General

  • Target

    efc5bcf16cfd98d254f43a4b1918fb4e753cb01a302bd6df50b1140daea86a03

  • Size

    185KB

  • MD5

    18e2edf5b582e43ec7c7f7371c1a1cc9

  • SHA1

    2b4c365c8a903278e3b5a3c5d87210d671dce962

  • SHA256

    efc5bcf16cfd98d254f43a4b1918fb4e753cb01a302bd6df50b1140daea86a03

  • SHA512

    478c3b3e0c0d1f7a5c5ac4969db4a131cdc281f5bd9b5563e3121c25c34050c0bcd44abbbe40de0569d21ae469427c569cf7ddff5e1e44b3b52fffbbbe13094f

  • SSDEEP

    1536:bvv54x7bWP+gRJN801xMaqdL+i03mrTF7kaSqYR0nNu8W5Y+HrHfMCh9U:bvh4B4+yJO01xMaqdnem3FX+Rv

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

4.tcp.eu.ngrok.io:19792

Mutex

27d6533d1fc1007bbf573ef90ffa545c

Attributes
  • reg_key

    27d6533d1fc1007bbf573ef90ffa545c

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • efc5bcf16cfd98d254f43a4b1918fb4e753cb01a302bd6df50b1140daea86a03
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections