General

  • Target

    0f7ed5e72874b741504c505598d3ad82

  • Size

    42KB

  • MD5

    0f7ed5e72874b741504c505598d3ad82

  • SHA1

    c8603a1d6a30625ed90ec19d3faf8dde7ceaa2b7

  • SHA256

    b5436b51673693630924c77981ec45bbe70fdcecfa0b923be83ad0ae2ed53593

  • SHA512

    fa5b6d6559c51cc1fb825ebeeb6205e4937f48ffdeb26f866cf26b2bda58e9d328f501735b1cfbe9a0b4c013ff7b2a95d32eb1054898408f3477115a234f6ba8

  • SSDEEP

    768:S5kQLCNhszg8QeWmsrM+rMRa8NuISt84r:SWQLCNGc8Qe7/+gRJN3H4

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

6.tcp.ngrok.io:19575

Mutex

5cfa9294b8b3ec23f36275e32525d259

Attributes
  • reg_key

    5cfa9294b8b3ec23f36275e32525d259

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0f7ed5e72874b741504c505598d3ad82
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections