General

  • Target

    Payload.exe

  • Size

    27KB

  • MD5

    0715e0bb60bd88ed720819444ad5ab93

  • SHA1

    256b6cbd4de6aa9d08b3d0ecc77a2b3027f0a389

  • SHA256

    23e4319534f162f3bbd74fd8706d779868eb99ecec60345af6cfe52daa1a4f6b

  • SHA512

    0fc5139b880408811c638775ea79fe52bfa634dc4979e1b92b4f041c06a25f8094939a5107fb0ff69c198cbf243fd3ad395f52460a6cc8ba150cf86d538b6bb8

  • SSDEEP

    384:3LyNMBjmgERY/cescmGPiJRjMFAQk93vmhm7UMKmIEecKdbXTzm9bVhcai6cUr6s:754sVvFA/vMHTi9bDg

Score
10/10

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

17.ip.gl.ply.gg:45753

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Payload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections