General

  • Target

    72feaca614e6e82fa5efd6d8795d68223fef6054ee898ad9cdaed71194a88c8d

  • Size

    93KB

  • MD5

    0a5ef41dd9cdbad5c5aaf4ca7b177700

  • SHA1

    ab67841aaec06b8527596203c2c426e6f59b0470

  • SHA256

    72feaca614e6e82fa5efd6d8795d68223fef6054ee898ad9cdaed71194a88c8d

  • SHA512

    d1b2e87c510bd0df4c801572dabfe14c6ce04b7ffac5883b3a26cf21a252369c026e878a3fee1d5bb0e5402b0d94146149f2da8418099de5afd63b4dc7fca653

  • SSDEEP

    768:uY35sTnkpjTMpALPGMtsas88EtNXhU9Y1mxCXxrjEtCdnl2pi1Rz4Rk3PsGdpKgM:7s7kVbPGHz88Eb71pjEwzGi1dD7DKgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

6.tcp.eu.ngrok.io:13672

Mutex

7330bac122947b8db6af3ae8d6783a41

Attributes
  • reg_key

    7330bac122947b8db6af3ae8d6783a41

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 72feaca614e6e82fa5efd6d8795d68223fef6054ee898ad9cdaed71194a88c8d
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections