General

  • Target

    bc3a293fd152a38a472ee6a5b16acb02efc7b8ce8a51a04598471701e8599bba

  • Size

    11KB

  • MD5

    05649c41931fd47dcde5f019e7c93060

  • SHA1

    c8e0b0ef7d6712915dc6a7d1b7ff2d93c8569d53

  • SHA256

    bc3a293fd152a38a472ee6a5b16acb02efc7b8ce8a51a04598471701e8599bba

  • SHA512

    41ae5e7e217612d97e1e41deb5edb2a05345744a8630d3942f9a7a193edfceb6bebae16524a1eca737027deb930b48f61e24191c0aeb0b72baaf56709d74649f

  • SSDEEP

    192:pEI1bgL59dVJiXchxEUTh/dLx560qBSKMeSX/h8wOLvwN/AxqjfY0X7DFxO:pEI1kLZrkmP/dV5TqBSKm5BYveYyY0e

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hacked by JmRh

C2

0.tcp.eu.ngrok.io:15422

Mutex

255adf5996e3bf23b41adff1252970bf

Attributes
  • reg_key

    255adf5996e3bf23b41adff1252970bf

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bc3a293fd152a38a472ee6a5b16acb02efc7b8ce8a51a04598471701e8599bba
    .zip

    Password: infected

  • 4a5fdda9ee07e884e1d89612b56a932acb9c812b72cccacde885da0f9b4eab31.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections