General

  • Target

    80f22403c66d12e0f25badf7868ddcf76ed9f58b8810df5f3c180dceb4e8e848

  • Size

    37KB

  • MD5

    e439d3bb5d047ba0474a2f1298056da3

  • SHA1

    b0e6c0ef32098176a92a5a96946043ab25d65929

  • SHA256

    80f22403c66d12e0f25badf7868ddcf76ed9f58b8810df5f3c180dceb4e8e848

  • SHA512

    5ba51bf22f10dcb284403e568b9ad135995baecbfabc8e6156b9bf15988eba618e52d9cc3ed8003b2d208ccd2587304c8b437806c95cfab28f38e488ac44bfb9

  • SSDEEP

    384:j9uBz6dgibXjpPu7w9qyMTA3/r6s2cLirAF+rMRTyN/0L+EcoinblneHQM3epzXn:2+NN9ZMTA3W1cGrM+rMRa8Nuua/t

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

6.tcp.eu.ngrok.io:15537

Mutex

31b4882139b1fcc7c89c45d1f24736b4

Attributes
  • reg_key

    31b4882139b1fcc7c89c45d1f24736b4

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 80f22403c66d12e0f25badf7868ddcf76ed9f58b8810df5f3c180dceb4e8e848
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections