General

  • Target

    de2dfe38ad70755ca3bebd7064d35aed54a2d580250c9791904b041531240c00

  • Size

    93KB

  • MD5

    e82ff35e54d6d9d7cc4d8a03e7dde9f5

  • SHA1

    f85a025d204749f2c47f687f8f5d96f4529bb127

  • SHA256

    de2dfe38ad70755ca3bebd7064d35aed54a2d580250c9791904b041531240c00

  • SHA512

    0079cbedc232b6d5928653240eecae9a1209cb71040e62f378a50794c9883e59a7ed07d31ebe48f17039e333d4a9b620aa40d482b9f3300032439ac26882306f

  • SSDEEP

    768:+Y3LupD9O/pBcxYsbae6GIXb9pDX2b98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3jsGy:JuLOx6baIa9RPj00ljEwzGi1dDPDsgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

c360c2cf5d82db52eda693e5800b7a72

Attributes
  • reg_key

    c360c2cf5d82db52eda693e5800b7a72

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • de2dfe38ad70755ca3bebd7064d35aed54a2d580250c9791904b041531240c00
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections