General

  • Target

    expensive.bat

  • Size

    93KB

  • MD5

    e7a8f86b30713f9217dcb696effb109f

  • SHA1

    c4a984de494d65357c038c11e5cccbc8a0ade5ef

  • SHA256

    930ae5b7c394dea547905df5d11f5fdfeda8f5539d002a5c4146a2a2b42972fc

  • SHA512

    f1522a8e6756f081956431f90c78b3bd3624fed6985ebabd5b729c4b775a863f555bf4fdaab72d7b95ca4a5fadac204b6f635d04e139f9dcd24a4e17aaf17bab

  • SSDEEP

    768:OY3vxnD9O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk34sG4:xxxOx6baIa9RZj00ljEwzGi1dDwD6gS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

04e95c6a4b9fef90c9f3ae8c1ad03007

Attributes
  • reg_key

    04e95c6a4b9fef90c9f3ae8c1ad03007

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • expensive.bat
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections