General

  • Target

    345r.exe

  • Size

    37KB

  • MD5

    237efc16a51642cc706584852bb81031

  • SHA1

    3e1bf00eac044a14bf56d35d07a692987e10b8c3

  • SHA256

    6dffb94969588fce3fd4e734ef446d4421757dcf9ee111618eda2265419ecb70

  • SHA512

    5aece0565b0f0c9dae38fc78382682ff4098060234c09f63a49e9a43bbdfc987649e5699d2b8f1e3393e7960e8ab903c608c80617778ee5de2752275e8d32a0f

  • SSDEEP

    384:Oh3TqbYLgibdjpPu7w9qyMT6xHNMs2Si9CrAF+rMRTyN/0L+EcoinblneHQM3epE:1cNN9ZMT6xmdSPrM+rMRa8Nu4vt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

7.tcp.eu.ngrok.io:16752

Mutex

bf964edcf89b187f7d94b761c569ead6

Attributes
  • reg_key

    bf964edcf89b187f7d94b761c569ead6

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 345r.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections