General

  • Target

    385bb371bb0a8fa316fb5e7055caf1f483b3df7c9a8df96a06a0e1a3e137eb5e

  • Size

    31KB

  • MD5

    06a06ca60cf80f02d21f4d769f94a1bf

  • SHA1

    c605ad04cb8690d08cdf92ede94efc8e8e194ff1

  • SHA256

    385bb371bb0a8fa316fb5e7055caf1f483b3df7c9a8df96a06a0e1a3e137eb5e

  • SHA512

    bb33b8d10f95efc78129779a03f9c5623d1a7609582df29e5fc83bda031487decb6f66b7da569c171d22d0041e2294357d189d487ee194cec7541de9cda23333

  • SSDEEP

    768:KzCfqdzNB0zx/6LmzmnAXdvAFQmIDUu0tij+bUj:n6KjpAQVkW+wj

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Diman

C2

2.tcp.eu.ngrok.io:19662

Mutex

4d63a7ba9eed77bd9a8f790ed318fd1c

Attributes
  • reg_key

    4d63a7ba9eed77bd9a8f790ed318fd1c

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 385bb371bb0a8fa316fb5e7055caf1f483b3df7c9a8df96a06a0e1a3e137eb5e
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections