General

  • Target

    b4b3024e4530395f1befe7e000e521aa

  • Size

    93KB

  • MD5

    b4b3024e4530395f1befe7e000e521aa

  • SHA1

    cf3ca2519b8f6a654807e384e31883cadf967aff

  • SHA256

    b0e4ffe4f149f9b6435fec757518ae2ba99293d416a28a3aebda4e877c2013e0

  • SHA512

    a582ee797750aaba5ee368d99dcf1e7996815eadc736e972a1d88686a5731f7b1b0985818aff86aab7127b3e7db789820ae6f710252c8ca5ddd0df32be45f2e0

  • SSDEEP

    768:MY3SYgSgmnldjcRoMwrx7Y+DIkIITJbXX0pOt8ux82WXxrjEtCdnl2pi1Rz4Rk37:eYumlbrq+1NTZ0OojEwzGi1dDFD5gS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

6.tcp.ngrok.io:17284

Mutex

44c547a0effac0a63bd21d0ef5280986

Attributes
  • reg_key

    44c547a0effac0a63bd21d0ef5280986

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b4b3024e4530395f1befe7e000e521aa
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections