General

  • Target

    fontmanager.exe

  • Size

    93KB

  • MD5

    d5cbf700c8fad0784a8491f4657cf112

  • SHA1

    69710b1d3a94a7a1ad92404b8862a3d7f29d69de

  • SHA256

    ebfbd798b9113ddf41c32887b5cb8e4e5a30e5eaa686272ec1558ee539602296

  • SHA512

    c6d93261417666a94653d429a20bca7362e3375fa87245a183b950a1153f318c8d68a361423b732625915a044f38524cb6b4fae8744340a49d858d6bdb239e73

  • SSDEEP

    768:vY3lyTnkpjTMpALPGMtsas88EtNXhU9Y1mxCXxrjEtCdnl2pi1Rz4Rk3isGdpggM:Uy7kVbPGHz88Eb71pjEwzGi1dDeDggS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

4.tcp.eu.ngrok.io:16181

Mutex

3361f51b9b9568e5d79038ba9e738580

Attributes
  • reg_key

    3361f51b9b9568e5d79038ba9e738580

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fontmanager.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections