General

  • Target

    2016387ced33889b3ee002b9ff9f7dfcd91ae2b1358f96279488265e44bc0770

  • Size

    18KB

  • MD5

    f16a34d67a40b66f2595de4b485b3ef8

  • SHA1

    0af910b1733db7dbbdc2aaf0ab9442203debdc89

  • SHA256

    2016387ced33889b3ee002b9ff9f7dfcd91ae2b1358f96279488265e44bc0770

  • SHA512

    4f329333c4eaac8429f6732436b4a7d48c3b8a1fa370bfa49e90c91588ba84c4034721bc5858f135828169a84a4a1f658c90db2cef2b1d0274a6be5156713fb3

  • SSDEEP

    384:EitLEhMqRI6pohxvP7o0twLy3Z6oaCAhRjoke1YD0Ev5NEFOmxcnc:FLE6YIeonP70GZ6vb8ke1YAI5iQmxcc

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

4.tcp.eu.ngrok.io:10929

Mutex

39b05030c645f6e80bce801caf1f7d61

Attributes
  • reg_key

    39b05030c645f6e80bce801caf1f7d61

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2016387ced33889b3ee002b9ff9f7dfcd91ae2b1358f96279488265e44bc0770
    .zip

    Password: infected

  • 6eea9641063b4f2e44360afc7bee1894423dc6aa92e7e497740fca1758d38c25.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections