General

  • Target

    62f3ce6e6e7a056f3226ac0a95b96a3b84a7b0ee8e338dbede213578a85fb935

  • Size

    37KB

  • MD5

    d4ed236bc76c12b0098d0bc7982b8abf

  • SHA1

    af4806f839065905f8a250895d447610669b45af

  • SHA256

    62f3ce6e6e7a056f3226ac0a95b96a3b84a7b0ee8e338dbede213578a85fb935

  • SHA512

    885db052edd36a472f1310d622744fc20990ae997869d51cb8c18a65888424c05d0fecf3f815e2891a76057bf22891fc601129a407f3b47d18e184ee4f770647

  • SSDEEP

    384:aNQCT0i9HdTe/kCOyU73oflQDXSikrAF+rMRTyN/0L+EcoinblneHQM3epzXrtNf:UVt1CFU73oSDSPrM+rMRa8Nuhtjt

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

sus

C2

0.tcp.eu.ngrok.io:15296

Mutex

f883103be5a3bdf16198ada5d92901f6

Attributes
  • reg_key

    f883103be5a3bdf16198ada5d92901f6

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 62f3ce6e6e7a056f3226ac0a95b96a3b84a7b0ee8e338dbede213578a85fb935
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections