General

  • Target

    For_Robloxian.exe

  • Size

    31KB

  • MD5

    6e13ebc415370b7434529a7af8de69e2

  • SHA1

    509f88b1c494d6ed1ff433a8ffc32ab5540ab352

  • SHA256

    4611c3f8044aa5b649a938f6e23332c393bc2afb3b58357c9a06dd3be1bc3b9a

  • SHA512

    425d329927a1198adb0acc0115d26dd6f592b80dcdf6d932a8a0ed2d65c6b15fcb05e686927b9dbe824c1d6d32fa0f8f4a074373b74ad32b35f72883cf4ab576

  • SSDEEP

    768:QZwowkZlH/azx1+tAiqvW97vKcQmIDUu0tiJ38sj:D4q+pPQVkTsj

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

RobloxianPC

C2

192.168.1.18:6522

Mutex

77221184e7b916458ee1d4f9aefd40bb

Attributes
  • reg_key

    77221184e7b916458ee1d4f9aefd40bb

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • For_Robloxian.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections