General

  • Target

    tmp

  • Size

    93KB

  • MD5

    e13d50a386b5e8f3ae3d11e3d1033e21

  • SHA1

    959b3e5462da725d7da1c046a241bdd9214e0036

  • SHA256

    07978fa2227aea6cde2cee414f1ae42054ccb9fedf60848c451fb2e5a8052e67

  • SHA512

    6ac3c052cb930c7a6692e14c8ac696b3d65664ebe05e0b7325abef159285271639c257b06c2c2f7eb25adfb415721639231ee383ab47c90a94cc4796a82d179a

  • SSDEEP

    768:IY33WJhWXxyFcxovUKUJuROprXtgN8eYhYbmXxrjEtCdnl2pi1Rz4Rk31sGdpSgM:nW3WhIUKcuOJXPhBjEwzGi1dDlDSgS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

178.63.148.180:5552

Mutex

502f9ccc8d7ba2dfb19936de34f9632e

Attributes
  • reg_key

    502f9ccc8d7ba2dfb19936de34f9632e

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • tmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections