General

  • Target

    tmp

  • Size

    93KB

  • MD5

    9af8fc91af5e99e4373cbb5713dd40ec

  • SHA1

    3ec0d34c5769ec819cb02a2d0bc8f7fde20505c9

  • SHA256

    1e7708aaa98da8303b9826e82ed2d0777a5684ecda49071eb91c9d0db4e02172

  • SHA512

    fb7bb746f660e024ed78c66ab9f5685e1d28b851dbf5227ddd09e686f13b8f3537c7678b8794e02362a99e83e462e8f9d9c7934aa3c83ef5db0c83c7fa1817ab

  • SSDEEP

    1536:p+jJD/HBZbszKu9AZpy7r1jEwzGi1dDnDagS:p+CzK4AZwHCi1dXf

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

43.249.38.36:5552

Mutex

e50c2e388f4a4092e8a1f2b2c9786ee0

Attributes
  • reg_key

    e50c2e388f4a4092e8a1f2b2c9786ee0

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • tmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections