General

  • Target

    60b632ca43af187e4ae1abe216db878fc7d0af4a1bb5c1d44e497501ecddad75

  • Size

    65KB

  • MD5

    9fb30e20290e3ce2c4782191ee35fc39

  • SHA1

    f70f7cabeee7878b990e7856e4fc997dd95411f4

  • SHA256

    60b632ca43af187e4ae1abe216db878fc7d0af4a1bb5c1d44e497501ecddad75

  • SHA512

    4fee03b1842ee39bbe50b38f3eac1f0d67ae12655f32230feb75a8feb5aa6f0a036372cb1b4bffd827b4dc15811fff6e93c9d1469f9281638c7eaba6697ac9ed

  • SSDEEP

    1536:6XfHJgVE7iT+gRJNSu31mgjpbQL0+fqap9VEl:6XfpgaQ+yJIu31mgjio+Sap9VEl

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

tcp://0.tcp.eu.ngrok.io:11128

Mutex

e8baa137aca8bc15f090e5154870da83

Attributes
  • reg_key

    e8baa137aca8bc15f090e5154870da83

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 60b632ca43af187e4ae1abe216db878fc7d0af4a1bb5c1d44e497501ecddad75
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections