General

  • Target

    dbc40fd63f5795e2b29d66c3a41d6e35ace81d843d35d9a1563ebcbd9daf3f01.exe

  • Size

    93KB

  • MD5

    00e97b0247faa03e0efec490ee36432b

  • SHA1

    26c63ef075852b7f5c66d06223f9c6e3324c945f

  • SHA256

    dbc40fd63f5795e2b29d66c3a41d6e35ace81d843d35d9a1563ebcbd9daf3f01

  • SHA512

    8023820303b79a8a48f129b5a516ac6820e673c736a8569715343d125b96a1278b5fcbd6e6c632d11fa36cc3bbad553020375eab6574f0fbf5bcae5d5fe8322e

  • SSDEEP

    1536:kCwC+xhUa9urgOBPmNvM4jEwzGi1dD5DBgS:kCmUa9urgOkdGi1dl+

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

2.tcp.eu.ngrok.io:14776

Mutex

6b60ebe24726bf228597ab0f8f9b1bc1

Attributes
  • reg_key

    6b60ebe24726bf228597ab0f8f9b1bc1

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • dbc40fd63f5795e2b29d66c3a41d6e35ace81d843d35d9a1563ebcbd9daf3f01.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections