General

  • Target

    4e4859aafd131ec0d377d927d9101c9c.bin

  • Size

    16KB

  • MD5

    694894d64514c5b9886a5cf9e8658c11

  • SHA1

    99bfadaeda1a81edc86e789754cede3a5fd1f4f3

  • SHA256

    dcd4ed3fc9834311a2a1edf4aacb21ee44f794d974041b9d4a7aeb6d21c90c4c

  • SHA512

    f060b295b714e72a1d8811662eea10ad866362d08af77c526d311ae32d0d3edf59027e51d3e1364704bdf32358b67df53ddb33e80081c1522aa382bd043cd1ba

  • SSDEEP

    384:gkKCknl4qXYFrpSvd0woPY6qvrg3Q13DiqrZ7AUE5nDB:gkKCk5YtSNovqvrg3Q1TiitE5nDB

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

4.tcp.eu.ngrok.io:19701

Mutex

2659b0ef527aa8381990f87c9daf0d01

Attributes
  • reg_key

    2659b0ef527aa8381990f87c9daf0d01

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4e4859aafd131ec0d377d927d9101c9c.bin
    .zip

    Password: infected

  • 2e4aa0e3181c96b6001135a8f5cdf00a041ad0e0cb6f61385b5942aae3e194bd.exe
    .exe windows:4 windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections