General

  • Target

    345r.exe

  • Size

    37KB

  • MD5

    b42194ec19c334f58fc860118961556a

  • SHA1

    8f9bcddf76c4340306e5ac37146dc5190d716cfe

  • SHA256

    164fc5773dc84cf114cdc98521db6d41b5fc8de59e286209b371577c0a4b40a9

  • SHA512

    9561ab8d59cd95740bef75b0b564ef255fee0dad98b467363097ae0a64d13ef044c2d02743ff5c1007fe603ca95a37bfa08df88d078b8d99f2885c9cc3244818

  • SSDEEP

    384:gh3TqbYLgibdjpPu7w9qyMT6xHNMs2Si9CrAF+rMRTyN/0L+EcoinblneHQM3epb:jcNN9ZMT6xmdSPrM+rMRa8Nu4qt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

7.tcp.eu.ngrok.io:16752

Mutex

bf964edcf89b187f7d94b761c569ead6

Attributes
  • reg_key

    bf964edcf89b187f7d94b761c569ead6

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 345r.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections